Author of the publication

SLEUTH: Real-time Attack Scenario Reconstruction from COTS Audit Data.

, , , , , , , and . USENIX Security Symposium, page 487-504. USENIX Association, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

SELF: a transparent security extension for ELF binaries., , and . NSPW, page 29-38. ACM, (2003)Alcatraz: An Isolated Environment for Experimenting with Untrusted Software., , , and . ACM Trans. Inf. Syst. Secur., 12 (3): 14:1-14:37 (2009)Java Stack Inspection: Eager evaluation Revisited, , , and . Department of Computer Science, SUNY StonyBrook, (2001)PeerShark: flow-clustering and conversation-generation for malicious peer-to-peer traffic identification., , and . EURASIP J. Inf. Secur., (2014)Remote Check Truncation Systems: Vulnerability Analysis and Countermeasures., , , , and . IEEE Access, (2020)SWIPE: eager erasure of sensitive data in large scale systems software., , , , and . CODASPY, page 295-306. ACM, (2012)TamperProof: a server-agnostic defense for parameter tampering attacks on web applications., , , , and . CODASPY, page 129-140. ACM, (2013)Digital Check Forgery Attacks on Client Check Truncation Systems., , , , and . Financial Cryptography, volume 8437 of Lecture Notes in Computer Science, page 3-20. Springer, (2014)XMC: A Logic-Programming-Based Verification Toolset., , , , , , and . CAV, volume 1855 of Lecture Notes in Computer Science, page 576-580. Springer, (2000)CMV: automatic verification of complete mediation for java virtual machines., , , and . AsiaCCS, page 100-111. ACM, (2008)