Author of the publication

Automated Provenance Analytics: A Regular Grammar Based Approach with Applications in Security.

, , , , and . TaPP, USENIX Association, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Can Data Provenance Put an End to the Data Breach?, and . IEEE Secur. Priv., 17 (4): 88-93 (2019)You Are What You Do: Hunting Stealthy Malware via Data Provenance Analysis., , , , , , , , , and 1 other author(s). NDSS, The Internet Society, (2020)OmegaLog: High-Fidelity Attack Investigation via Transparent Multi-layer Log Analysis., , , and . NDSS, The Internet Society, (2020)SoK: History is a Vast Early Warning System: Auditing the Provenance of System Intrusions., , , , , , , , and . SP, page 2620-2638. IEEE, (2023)Forensic Analysis of Configuration-based Attacks., , , , , , and . NDSS, The Internet Society, (2022)Towards Scalable Cluster Auditing through Grammatical Inference over Provenance Graphs., , , , and . NDSS, The Internet Society, (2018)This is Why We Can't Cache Nice Things: Lightning-Fast Threat Hunting using Suspicion-Based Hierarchical Storage., , , , , , , , , and 1 other author(s). ACSAC, page 165-178. ACM, (2020)FAuST: Striking a Bargain between Forensic Auditing's Security and Throughput., , , , , , , and . ACSAC, page 813-826. ACM, (2022)Analysis of Privacy Protections in Fitness Tracking Social Networks -or- You can run, but can you hide?, , and . USENIX Security Symposium, page 497-512. USENIX Association, (2018)On the Forensic Validity of Approximated Audit Logs., , , , , and . ACSAC, page 189-202. ACM, (2020)