Threat detection and investigation with system-level provenance graphs: A survey

Z Li, QA Chen, R Yang, Y Chen, W Ruan - Computers & Security, 2021 - Elsevier
With the development of information technology, the border of the cyberspace gets much
broader and thus also exposes increasingly more vulnerabilities to attackers. Traditional …

Holmes: real-time apt detection through correlation of suspicious information flows

SM Milajerdi, R Gjomemo, B Eshete… - … IEEE symposium on …, 2019 - ieeexplore.ieee.org
In this paper, we present HOLMES, a system that implements a new approach to the
detection of Advanced and Persistent Threats (APTs). HOLMES is inspired by several case …

Vuzzer: Application-aware evolutionary fuzzing

S Rawat, V Jain, A Kumar, L Cojocar… - 2017 Network and …, 2017 - research.vu.nl
Fuzzing is an effective software testing technique to find bugs. Given the size and complexity
of real-world applications, modern fuzzers tend to be either scalable, but not effective in …

SDTE: A secure blockchain-based data trading ecosystem

W Dai, C Dai, KKR Choo, C Cui… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Data, a key asset in our data-driven economy, has fueled the emergence of a new data
trading industry. However, there are a number of limitations in conventional data trading …

{GREYONE}: Data flow sensitive fuzzing

S Gan, C Zhang, P Chen, B Zhao, X Qin, D Wu… - 29th USENIX security …, 2020 - usenix.org
Data flow analysis (eg, dynamic taint analysis) has proven to be useful for guiding fuzzers to
explore hard-to-reach code and find vulnerabilities. However, traditional taint analysis is …

{SLEUTH}: Real-time attack scenario reconstruction from {COTS} audit data

MN Hossain, SM Milajerdi, J Wang, B Eshete… - 26th USENIX Security …, 2017 - usenix.org
We present an approach and system for real-time reconstruction of attack scenarios on an
enterprise host. To meet the scalability and real-time needs of the problem, we develop a …

Combating dependence explosion in forensic analysis using alternative tag propagation semantics

MN Hossain, S Sheikhi, R Sekar - 2020 IEEE symposium on …, 2020 - ieeexplore.ieee.org
We are witnessing a rapid escalation in targeted cyber-attacks called Advanced and
Persistent Threats (APTs). Carried out by skilled adversaries, these attacks take place over …

[HTML][HTML] KRYSTAL: Knowledge graph-based framework for tactical attack discovery in audit data

K Kurniawan, A Ekelhart, E Kiesling, G Quirchmayr… - Computers & …, 2022 - Elsevier
Attack graph-based methods are a promising approach towards discovering attacks and
various techniques have been proposed recently. A key limitation, however, is that …

Protracer: Towards practical provenance tracing by alternating between logging and tainting

S Ma, X Zhang, D Xu - 23rd Annual Network And …, 2016 - scholarship.libraries.rutgers.edu
ProTracer: towards practical provenance tracing by alternating between logging and
tainting Page 1 Please do not remove this page ProTracer: towards practical provenance …

Karonte: Detecting insecure multi-binary interactions in embedded firmware

N Redini, A Machiry, R Wang… - … IEEE Symposium on …, 2020 - ieeexplore.ieee.org
Low-power, single-purpose embedded devices (eg, routers and IoT devices) have become
ubiquitous. While they automate and simplify many aspects of users' lives, recent large-scale …