Lprov: Practical Library-aware Provenance Tracing
暂无分享,去创建一个
[1] Steve Vandebogart,et al. Labels and event processes in the Asbestos operating system , 2005, TOCS.
[2] Eyal de Lara,et al. The taser intrusion recovery system , 2005, SOSP '05.
[3] James Newsome,et al. Dynamic Taint Analysis for Automatic Detection, Analysis, and SignatureGeneration of Exploits on Commodity Software , 2005, NDSS.
[4] Angelos D. Keromytis,et al. libdft: practical dynamic data flow tracking for commodity systems , 2012, VEE '12.
[5] Thomas Moyer,et al. Trustworthy Whole-System Provenance for the Linux Kernel , 2015, USENIX Security Symposium.
[6] Stephen McCamant,et al. DTA++: Dynamic Taint Analysis with Targeted Control-Flow Propagation , 2011, NDSS.
[7] Chun Zhang,et al. vPath: Precise Discovery of Request Processing Paths from Black-Box Observations of Thread and Network Activities , 2009, USENIX Annual Technical Conference.
[8] Eddie Kohler,et al. Making information flow explicit in HiStar , 2006, OSDI '06.
[9] Xiangyu Zhang,et al. High Accuracy Attack Provenance via Binary-based Execution Partition , 2013, NDSS.
[10] Sushil Jajodia,et al. Recovery from Malicious Transactions , 2002, IEEE Trans. Knowl. Data Eng..
[11] Xi Wang,et al. Intrusion Recovery Using Selective Re-execution , 2010, OSDI.
[12] Herbert Bos,et al. Minemu: The World's Fastest Taint Tracker , 2011, RAID.
[13] Patrick D. McDaniel,et al. Hi-Fi: collecting high-fidelity whole-system provenance , 2012, ACSAC '12.
[14] Wenke Lee,et al. RecProv: Towards Provenance-Aware User Space Record and Replay , 2016, IPAW.
[15] Jack W. Davidson,et al. Mixr: Flexible Runtime Rerandomization for Binaries , 2017, MTD@CCS.
[16] Xiangyu Zhang,et al. LDX: Causality Inference by Lightweight Dual Execution , 2016, ASPLOS.
[17] Tal Garfinkel,et al. Understanding data lifetime via whole system simulation , 2004 .
[18] Subbarayan Venkatesan,et al. Forensic analysis of file system intrusions using improved backtracking , 2005, Third IEEE International Workshop on Information Assurance (IWIA'05).
[19] Naren Ramakrishnan,et al. Detection of stealthy malware activities with traffic causality and scalable triggering relation discovery , 2014, AsiaCCS.
[20] Ashish Gehani,et al. Towards Automated Collection of Application-Level Data Provenance , 2012, TaPP.
[21] Fabian Monrose,et al. Trail of bytes: efficient support for forensic analysis , 2010, CCS '10.
[22] Samuel T. King,et al. Backtracking intrusions , 2003, SOSP '03.
[23] Cheng Wang,et al. LIFT: A Low-Overhead Practical Information Flow Tracking System for Detecting Security Attacks , 2006, 2006 39th Annual IEEE/ACM International Symposium on Microarchitecture (MICRO'06).
[24] Tzi-cker Chiueh,et al. Design, implementation, and evaluation of repairable file service , 2003, 2003 International Conference on Dependable Systems and Networks, 2003. Proceedings..
[25] Margo I. Seltzer,et al. Issues in Automatic Provenance Collection , 2006, IPAW.
[26] Ashish Gehani,et al. SPADE: Support for Provenance Auditing in Distributed Environments , 2012, Middleware.
[27] Xuxian Jiang,et al. Provenance-Aware Tracing ofWorm Break-in and Contaminations: A Process Coloring Approach , 2006, 26th IEEE International Conference on Distributed Computing Systems (ICDCS'06).
[28] Latifur Khan,et al. SGX-Log: Securing System Logs With SGX , 2017, AsiaCCS.
[29] Xiangyu Zhang,et al. Accurate, Low Cost and Instrumentation-Free Security Audit Logging for Windows , 2015, ACSAC.
[30] Xiangyu Zhang,et al. LogGC: garbage collecting audit log , 2013, CCS.
[31] Alessandro Orso,et al. RAIN: Refinable Attack Investigation with On-demand Inter-Process Information Flow Tracking , 2017, CCS.
[32] Somesh Jha,et al. A Declarative Framework for Intrusion Analysis , 2010, Cyber Situational Awareness.
[33] Junfeng Yang,et al. Shuffler: Fast and Deployable Continuous Code Re-Randomization , 2016, OSDI.
[34] Adrian Perrig,et al. XTRec: Secure Real-Time Execution Trace Recording on Commodity Platforms , 2011, 2011 44th Hawaii International Conference on System Sciences.
[35] Alessandro Orso,et al. Dytan: a generic dynamic taint analysis framework , 2007, ISSTA '07.
[36] Margo I. Seltzer,et al. Provenance-Aware Storage Systems , 2006, USENIX ATC, General Track.
[37] Heng Yin,et al. Panorama: capturing system-wide information flow for malware detection and analysis , 2007, CCS '07.
[38] Richard Mortier,et al. Using Magpie for Request Extraction and Workload Modelling , 2004, OSDI.
[39] Xi Chen,et al. No Need to Hide: Protecting Safe Regions on Commodity Hardware , 2017, EuroSys.
[40] Zhenkai Liang,et al. BitBlaze: A New Approach to Computer Security via Binary Analysis , 2008, ICISS.
[41] Xiang Zhang,et al. Tracing Lineage Beyond Relational Operators , 2007, VLDB.
[42] Fei Wang,et al. MPI: Multiple Perspective Attack Investigation with Semantic Aware Execution Partitioning , 2017, USENIX Security Symposium.
[43] Chao Yang,et al. Using Provenance Patterns to Vet Sensitive Behaviors in Android Apps , 2015, SecureComm.
[44] Margo I. Seltzer,et al. Layering in Provenance Systems , 2009, USENIX Annual Technical Conference.
[45] Sencun Zhu,et al. Behavior based software theft detection , 2009, CCS.
[46] Xiangyu Zhang,et al. ProTracer: Towards Practical Provenance Tracing by Alternating Between Logging and Tainting , 2016, NDSS.
[47] Stephen McCamant,et al. Quantitative information flow as network flow capacity , 2008, PLDI '08.
[48] Markus Jakobsson,et al. Server-side detection of malware infection , 2009, NSPW '09.
[49] Xiangyu Zhang,et al. IntroLib: Efficient and transparent library call introspection for malware forensics , 2012 .
[50] William W. Streilein,et al. Timely Rerandomization for Mitigating Memory Disclosures , 2015, CCS.
[51] Samuel T. King,et al. Enriching Intrusion Alerts Through Multi-Host Causality , 2005, NDSS.
[52] Byung-Gon Chun,et al. TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones , 2010, OSDI.
[53] R. Sunitha,et al. DATA-PROVENANCE VERIFICATION FOR SECURE HOSTS , 2013 .
[54] Angelos D. Keromytis,et al. A General Approach for Efficiently Accelerating Software-based Dynamic Data Flow Tracking on Commodity Hardware , 2012, NDSS.