Provenance graphs are structured audit logs that describe the history of...
For safety reasons, unprivileged users today have only limited ways to
c...
Despite the wide usage of container-based cloud computing, container aud...
Many users implicitly assume that software can only be exploited after i...
Host-based anomaly detectors generate alarms by inspecting audit logs fo...
Advanced Persistent Threats (APTs) are difficult to detect due to their
...
Identifying the root cause and impact of a system intrusion remains a
fo...
Intrusion detection is an arms race; attackers evade intrusion detection...
We present FRAPpuccino (or FRAP), a provenance-based fault detection
mec...
Data provenance describes how data came to be in its present form. It
in...