Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Threat detection and investigation with system-level provenance graphs: A survey
With the development of information technology, the border of the cyberspace gets much
broader and thus also exposes increasingly more vulnerabilities to attackers. Traditional …
broader and thus also exposes increasingly more vulnerabilities to attackers. Traditional …
Holmes: real-time apt detection through correlation of suspicious information flows
In this paper, we present HOLMES, a system that implements a new approach to the
detection of Advanced and Persistent Threats (APTs). HOLMES is inspired by several case …
detection of Advanced and Persistent Threats (APTs). HOLMES is inspired by several case …
Vuzzer: Application-aware evolutionary fuzzing
Fuzzing is an effective software testing technique to find bugs. Given the size and complexity
of real-world applications, modern fuzzers tend to be either scalable, but not effective in …
of real-world applications, modern fuzzers tend to be either scalable, but not effective in …
SDTE: A secure blockchain-based data trading ecosystem
Data, a key asset in our data-driven economy, has fueled the emergence of a new data
trading industry. However, there are a number of limitations in conventional data trading …
trading industry. However, there are a number of limitations in conventional data trading …
{GREYONE}: Data flow sensitive fuzzing
Data flow analysis (eg, dynamic taint analysis) has proven to be useful for guiding fuzzers to
explore hard-to-reach code and find vulnerabilities. However, traditional taint analysis is …
explore hard-to-reach code and find vulnerabilities. However, traditional taint analysis is …
{SLEUTH}: Real-time attack scenario reconstruction from {COTS} audit data
We present an approach and system for real-time reconstruction of attack scenarios on an
enterprise host. To meet the scalability and real-time needs of the problem, we develop a …
enterprise host. To meet the scalability and real-time needs of the problem, we develop a …
Combating dependence explosion in forensic analysis using alternative tag propagation semantics
We are witnessing a rapid escalation in targeted cyber-attacks called Advanced and
Persistent Threats (APTs). Carried out by skilled adversaries, these attacks take place over …
Persistent Threats (APTs). Carried out by skilled adversaries, these attacks take place over …
[HTML][HTML] KRYSTAL: Knowledge graph-based framework for tactical attack discovery in audit data
Attack graph-based methods are a promising approach towards discovering attacks and
various techniques have been proposed recently. A key limitation, however, is that …
various techniques have been proposed recently. A key limitation, however, is that …
Protracer: Towards practical provenance tracing by alternating between logging and tainting
ProTracer: towards practical provenance tracing by alternating between logging and
tainting Page 1 Please do not remove this page ProTracer: towards practical provenance …
tainting Page 1 Please do not remove this page ProTracer: towards practical provenance …
Karonte: Detecting insecure multi-binary interactions in embedded firmware
Low-power, single-purpose embedded devices (eg, routers and IoT devices) have become
ubiquitous. While they automate and simplify many aspects of users' lives, recent large-scale …
ubiquitous. While they automate and simplify many aspects of users' lives, recent large-scale …