Kernel-Supported Cost-Effective Audit Logging for Causality Tracking
暂无分享,去创建一个
Somesh Jha | Vinod Yegneswaran | Xiangyu Zhang | Juan Zhai | Dongyan Xu | Ashish Gehani | Yonghwi Kwon | Gabriela F. Cretu-Ciocarlie | Shiqing Ma | Kyu Hyung Lee | X. Zhang | V. Yegneswaran | S. Jha | K. H. Lee | Dongyan Xu | Shiqing Ma | Juan Zhai | Yonghwi Kwon | A. Gehani
[1] Margo I. Seltzer,et al. Provenance-Aware Storage Systems , 2006, USENIX ATC, General Track.
[2] Markus Jakobsson,et al. Server-side detection of malware infection , 2009, NSPW '09.
[3] Eyal de Lara,et al. The taser intrusion recovery system , 2005, SOSP '05.
[4] Xinming Ou,et al. A scalable approach to attack graph generation , 2006, CCS '06.
[5] Eddie Kohler,et al. Making information flow explicit in HiStar , 2006, OSDI '06.
[6] Dan Feng,et al. Evaluation of a Hybrid Approach for Efficient Provenance Storage , 2013, TOS.
[7] Somesh Jha,et al. Automated generation and analysis of attack graphs , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.
[8] Fengyuan Xu,et al. High Fidelity Data Reduction for Big Data Security Dependency Analyses , 2016, CCS.
[9] Edmund M. Clarke,et al. Ranking Attack Graphs , 2006, RAID.
[10] Patrick D. McDaniel,et al. Hi-Fi: collecting high-fidelity whole-system provenance , 2012, ACSAC '12.
[11] Thomas Moyer,et al. Take Only What You Need: Leveraging Mandatory Access Control Policy to Reduce Provenance Storage Costs , 2015, TaPP.
[12] Krzysztof Z. Gajos,et al. Evaluation of Filesystem Provenance Visualization Tools , 2013, IEEE Transactions on Visualization and Computer Graphics.
[13] Fei Wang,et al. MPI: Multiple Perspective Attack Investigation with Semantic Aware Execution Partitioning , 2017, USENIX Security Symposium.
[14] Andrew W. Appel,et al. MulVAL: A Logic-based Network Security Analyzer , 2005, USENIX Security Symposium.
[15] Xinming Ou,et al. Identifying Critical Attack Assets in Dependency Attack Graphs , 2008, ESORICS.
[16] Samuel T. King,et al. Enriching Intrusion Alerts Through Multi-Host Causality , 2005, NDSS.
[17] Xiangyu Zhang,et al. High Accuracy Attack Provenance via Binary-based Execution Partition , 2013, NDSS.
[18] Kevin R. B. Butler,et al. ProvUSB: Block-level Provenance-Based Data Protection for USB Storage Devices , 2016, CCS.
[19] Yogesh L. Simmhan,et al. The Open Provenance Model core specification (v1.1) , 2011, Future Gener. Comput. Syst..
[20] Xiangyu Zhang,et al. ProTracer: Towards Practical Provenance Tracing by Alternating Between Logging and Tainting , 2016, NDSS.
[21] Margo I. Seltzer,et al. Layering in Provenance Systems , 2009, USENIX Annual Technical Conference.
[22] Xiangyu Zhang,et al. LogGC: garbage collecting audit log , 2013, CCS.
[23] Ahmed Amer,et al. Compressing Provenance Graphs , 2011, TaPP.
[24] Erez Zadok,et al. Selective Versioning in a Secure Disk System , 2008, USENIX Security Symposium.
[25] Xi Wang,et al. Intrusion Recovery Using Selective Re-execution , 2010, OSDI.
[26] Subbarayan Venkatesan,et al. Forensic analysis of file system intrusions using improved backtracking , 2005, Third IEEE International Workshop on Information Assurance (IWIA'05).
[27] Adrian Perrig,et al. XTRec: Secure Real-Time Execution Trace Recording on Commodity Platforms , 2011, 2011 44th Hawaii International Conference on System Sciences.
[28] Alessandro Orso,et al. RAIN: Refinable Attack Investigation with On-demand Inter-Process Information Flow Tracking , 2017, CCS.
[29] Ashish Gehani,et al. SPADE: Support for Provenance Auditing in Distributed Environments , 2012, Middleware.
[30] Yulai Xie,et al. A hybrid approach for efficient provenance storage , 2012, CIKM '12.
[31] Thomas Moyer,et al. Trustworthy Whole-System Provenance for the Linux Kernel , 2015, USENIX Security Symposium.
[32] Michael Chow,et al. Eidetic Systems , 2014, OSDI.
[33] Tzi-cker Chiueh,et al. Design, implementation, and evaluation of repairable file service , 2003, 2003 International Conference on Dependable Systems and Networks, 2003. Proceedings..
[34] Haoxiang Lin,et al. G2: A Graph Processing System for Diagnosing Distributed Systems , 2011, USENIX Annual Technical Conference.
[35] Margo I. Seltzer,et al. Issues in Automatic Provenance Collection , 2006, IPAW.