Provenance graphs are structured audit logs that describe the history of...
For safety reasons, unprivileged users today have only limited ways to
c...
Security research has concentrated on converting operating system audit ...
Despite the wide usage of container-based cloud computing, container aud...
This article presents a study on the quality and execution of research c...
Many users implicitly assume that software can only be exploited after i...
Host-based anomaly detectors generate alarms by inspecting audit logs fo...
Distributed analytics engines such as Spark are a common choice for
proc...
Advanced Persistent Threats (APTs) are difficult to detect due to their
...
System level provenance is of widespread interest for applications such ...
The Internet of Things promises a connected environment reacting to and
...
Identifying the root cause and impact of a system intrusion remains a
fo...
Intrusion detection is an arms race; attackers evade intrusion detection...
We present FRAPpuccino (or FRAP), a provenance-based fault detection
mec...
Data provenance describes how data came to be in its present form. It
in...