-
1
-
-
85026950868
-
-
Csdn password leak, http://en.people.cn/90778/7688084.html.
-
Csdn Password Leak
-
-
-
2
-
-
85026951138
-
-
Heartbleed, http://www.bbc.com/news/technology-26969629.
-
Heartbleed
-
-
-
3
-
-
0001883632
-
A sense of self for unix processes
-
May
-
S. Forrest, S.A. Hofmeyr, A. Somayaji, T.A. Longstaff, A sense of self for unix processes, in: Proc. of IEEE SP, May 1996.
-
(1996)
Proc. of IEEE SP
-
-
Forrest, S.1
Hofmeyr, S.A.2
Somayaji, A.3
Longstaff, T.A.4
-
4
-
-
84940401467
-
Probabilistic anomaly detection based on system call analysis
-
P. Maciolek, P. Krol, and J. Kozlak Probabilistic anomaly detection based on system call analysis Comput. Sci. J. 8 2007
-
(2007)
Comput. Sci. J.
, vol.8
-
-
Maciolek, P.1
Krol, P.2
Kozlak, J.3
-
5
-
-
0032313923
-
Intrusion detection using sequences of system calls
-
S.A. Hofmeyr, S. Forrest, and A. Somayaji Intrusion detection using sequences of system calls J. Comput. Secur. 6 3 1998 151 180
-
(1998)
J. Comput. Secur.
, vol.6
, Issue.3
, pp. 151-180
-
-
Hofmeyr, S.A.1
Forrest, S.2
Somayaji, A.3
-
7
-
-
16644376937
-
Forensic computer analysis: An introduction
-
72-75
-
D. Farmer, and W. Venema Forensic computer analysis: An introduction Dr. Dobb's J. 25 9(Sept.) 2000 70 72-75
-
(2000)
Dr. Dobb's J.
, vol.25
, Issue.9 Sept
, pp. 70
-
-
Farmer, D.1
Venema, W.2
-
8
-
-
33947629208
-
Provenance-aware tracing of worm break-in and contaminations: A process coloring approach
-
July
-
X. Jiang, A. Walters, F. Buchholz, D. Xu, Y. Wang, E.H. Spafford, Provenance-aware tracing of worm break-in and contaminations: A process coloring approach, in: Proc. of IEEE ICDCS, July 2006.
-
(2006)
Proc. of IEEE ICDCS
-
-
Jiang, X.1
Walters, A.2
Buchholz, F.3
Xu, D.4
Wang, Y.5
Spafford, E.H.6
-
9
-
-
85076227002
-
Provenance-aware storage systems
-
May
-
K.-K. Muniswamy-Reddy, D.A. Holland, U. Braun, M.I. Seltzer, Provenance-aware storage systems, in: Proc. of USENIX ATC, May 2006.
-
(2006)
Proc. of USENIX ATC
-
-
Muniswamy-Reddy, K.-K.1
Holland, D.A.2
Braun, U.3
Seltzer, M.I.4
-
10
-
-
84858835658
-
Trio: A system for integrated management of data, accuracy, and lineage
-
Asilomar, CA, January
-
J. Widom, Trio: A system for integrated management of data, accuracy, and lineage, in: Proc. of CIDR, Asilomar, CA, January, 2005, pp. 262-276.
-
(2005)
Proc. of CIDR
, pp. 262-276
-
-
Widom, J.1
-
11
-
-
85160778757
-
Using provenance to aid in personal file search
-
June
-
S. Shah, C.A.N. Soules, G.R. Ganger, B.D. Noble, Using provenance to aid in personal file search, in: Proc. of USENIX ATC, June 2007.
-
(2007)
Proc. of USENIX ATC
-
-
Shah, S.1
Soules, C.A.N.2
Ganger, G.R.3
Noble, B.D.4
-
13
-
-
84995516093
-
SPADE: Support for provenance auditing in distributed environments
-
December
-
A. Gehani, D. Tariq, SPADE: Support for provenance auditing in distributed environments, in: Proc. of ACM/IFIP/USENIX Middleware, December 2012.
-
(2012)
Proc. of ACM/IFIP/USENIX Middleware
-
-
Gehani, A.1
Tariq, D.2
-
14
-
-
84960327595
-
Story book: An efficient extensible provenance framework
-
February
-
R. Spillane, R. Sears, C. Yalamanchili, S. Gaikwad, M. Chinni, E. Zadok, Story book: An efficient extensible provenance framework, in: Proc. of USENIX Tapp, February 2009.
-
(2009)
Proc. of USENIX Tapp
-
-
Spillane, R.1
Sears, R.2
Yalamanchili, C.3
Gaikwad, S.4
Chinni, M.5
Zadok, E.6
-
15
-
-
84960326695
-
Composing lineage metadata with xml for custom satellite-derived data products
-
June
-
R. Bose, J. Frew, Composing lineage metadata with xml for custom satellite-derived data products, in: Proc. of IEEE SSDBM, June 2004.
-
(2004)
Proc. of IEEE SSDBM
-
-
Bose, R.1
Frew, J.2
-
17
-
-
85029476360
-
Layering in provenance systems
-
June
-
K.-K. Muniswamy-Reddy, U. Braun, D.A. Holland, P. Macko, D. Maclean, D. Margo, M. Seltzer, R. Smogor, Layering in provenance systems, in: Proc. of USENIX ATC, June 2009.
-
(2009)
Proc. of USENIX ATC
-
-
Muniswamy-Reddy, K.-K.1
Braun, U.2
Holland, D.A.3
Macko, P.4
Maclean, D.5
Margo, D.6
Seltzer, M.7
Smogor, R.8
-
19
-
-
80052652946
-
Trusted computing and provenance: Better together
-
J. Lyle, A. Martin, Trusted computing and provenance: Better together, in: Proc. of USENIX Tapp, 2010.
-
(2010)
Proc. of USENIX Tapp
-
-
Lyle, J.1
Martin, A.2
-
20
-
-
85062006160
-
The case of the fake picasso: Preventing history forgery with secure provenance
-
June
-
R. Hasan, R. Sion, M. Winslett, The case of the fake picasso: Preventing history forgery with secure provenance, in: Proc. of USENIX FAST, June 2009.
-
(2009)
Proc. of USENIX FAST
-
-
Hasan, R.1
Sion, R.2
Winslett, M.3
-
22
-
-
84885588230
-
The taser intrusion recovery system
-
October
-
A. Goel, K. Po, K. Farhadi, Z. Li, E.d. Lara, The taser intrusion recovery system, in: Proc. of ACM SOSP, October 2005.
-
(2005)
Proc. of ACM SOSP
-
-
Goel, A.1
Po, K.2
Farhadi, K.3
Li, Z.4
Lara, E.D.5
-
24
-
-
85026956168
-
-
DARPA data sets, http://www.ll.mit.edu/ideval/data/.
-
DARPA Data Sets
-
-
-
25
-
-
85026951775
-
-
UNM data sets, http://www.cs.unm.edu/~immsec/systemcalls.htm.
-
UNM Data Sets
-
-
-
26
-
-
84960397980
-
A hybrid approach for efficient provenance storage
-
October
-
Y. Xie, K.-K. Muniswamy-Reddy, D. Feng, Y. Li, D.D.E. Long, Z. Tan, L. Chen, A hybrid approach for efficient provenance storage, in: Proc. of ACM CIKM, October 2012.
-
(2012)
Proc. of ACM CIKM
-
-
Xie, Y.1
Muniswamy-Reddy, K.-K.2
Feng, D.3
Li, Y.4
Long, D.D.E.5
Tan, Z.6
Chen, L.7
-
27
-
-
85084163349
-
Data mining approaches for intrusion detection
-
January
-
W. Lee, S.J. Stolfo, Data mining approaches for intrusion detection, in: Proc. of USENIX Security, January 1998.
-
(1998)
Proc. of USENIX Security
-
-
Lee, W.1
Stolfo, S.J.2
-
28
-
-
0034836394
-
Intrusion detection via static analysis
-
D. Wagner, D. Dean, Intrusion detection via static analysis, in: Proc. of IEEE SP, 2001.
-
(2001)
Proc. of IEEE SP
-
-
Wagner, D.1
Dean, D.2
-
29
-
-
1342274727
-
A fast automation-based method for detecting anomalous program behaviors
-
May
-
E. Sekar, M. Bendre, D. Dhurjati, P. Bollineni, A fast automation-based method for detecting anomalous program behaviors, in: Proc. of IEEE SP, May 2001.
-
(2001)
Proc. of IEEE SP
-
-
Sekar, E.1
Bendre, M.2
Dhurjati, D.3
Bollineni, P.4
-
31
-
-
84960357745
-
Detecting malicious software by monitoring anomalous windows registry access
-
October
-
F. Apap, A. Honig, S. Hershkop, E. Eskin, S. Stolfo, Detecting malicious software by monitoring anomalous windows registry access, in: Proc. of RAID, October 2002.
-
(2002)
Proc. of RAID
-
-
Apap, F.1
Honig, A.2
Hershkop, S.3
Eskin, E.4
Stolfo, S.5
-
33
-
-
33845599591
-
On the learning of system call attributes for host-based anomaly detection
-
G. Tandon, and P.K. Chan On the learning of system call attributes for host-based anomaly detection Int. J. Artif. Intell. Tools 15 6 2006 875 892
-
(2006)
Int. J. Artif. Intell. Tools
, vol.15
, Issue.6
, pp. 875-892
-
-
Tandon, G.1
Chan, P.K.2
-
34
-
-
84950151731
-
Leaps: Detecting camouflaged attacks with statistical learning guided by program analysis
-
Z. Gu, K. Pei, Q. Wang, L. Si, X. Zhang, D. Xu, Leaps: Detecting camouflaged attacks with statistical learning guided by program analysis, in: Proc. of IEEE/IFIP DSN, 2015.
-
(2015)
Proc. of IEEE/IFIP DSN
-
-
Gu, Z.1
Pei, K.2
Wang, Q.3
Si, L.4
Zhang, X.5
Xu, D.6
-
35
-
-
84994210095
-
A formal framework for program anomaly detection
-
X. Shu, D. Yao, B.G. Ryder, A formal framework for program anomaly detection, in: Proc. of RAID, 2015.
-
(2015)
Proc. of RAID
-
-
Shu, X.1
Yao, D.2
Ryder, B.G.3
-
36
-
-
84869475315
-
Kargus: A highly scalable software-based intrusion detection system
-
October
-
M. Jamshed, J. Lee, S. Moon, I. Yun, D. Kim, S. Lee, Y. Yi, K. Park, Kargus: a highly scalable software-based intrusion detection system, in: Proc. of ACM CCS, October 2012.
-
(2012)
Proc. of ACM CCS
-
-
Jamshed, M.1
Lee, J.2
Moon, S.3
Yun, I.4
Kim, D.5
Lee, S.6
Yi, Y.7
Park, K.8
-
37
-
-
84914145282
-
Pratical evasion of a learning-based classifier: A case study
-
N. Srndic, P. Laskov, Pratical evasion of a learning-based classifier: A case study, in: Proc. of IEEE SP, 2014.
-
(2014)
Proc. of IEEE SP
-
-
Srndic, N.1
Laskov, P.2
-
38
-
-
84960339964
-
Principled sampling for anomaly detection
-
February
-
B. Juba, C. Musco, F. Long, S.S. Douskos, M. Rinard, Principled sampling for anomaly detection, in: Proc. of NDSS, February 2015.
-
(2015)
Proc. of NDSS
-
-
Juba, B.1
Musco, C.2
Long, F.3
Douskos, S.S.4
Rinard, M.5
-
39
-
-
84960382252
-
Forensix: A robust, high performance reconstruction system
-
June
-
A. Goel, W. Feng, D. Maier, W. Feng, J. Walpole, Forensix: A robust, high performance reconstruction system, in: Proc. of IEEE SDCS, June 2005.
-
(2005)
Proc. of IEEE SDCS
-
-
Goel, A.1
Feng, W.2
Maier, D.3
Feng, W.4
Walpole, J.5
-
40
-
-
84859878563
-
Tracking emigrant data via transient provenance
-
June
-
S.N. Jones, C.R. Strong, D.D.E. Long, E.L. Miller, Tracking emigrant data via transient provenance, in: Proc. of USENIX TaPP, June 2011.
-
(2011)
Proc. of USENIX TaPP
-
-
Jones, S.N.1
Strong, C.R.2
Long, D.D.E.3
Miller, E.L.4
-
41
-
-
33745436100
-
-
February
-
S.T. King, Z.M. Mao, D.G. Lucchetti, P.M. Chen, Enriching intrusion alerts through multi-host causality, in: Proc. of NDSS, February 2005.
-
(2005)
Proc. of NDSS
-
-
King, S.T.1
Mao, Z.M.2
Lucchetti, D.G.3
Chen, P.M.4
Intrusion Alerts Through Multi-Host Causality, E.5
-
42
-
-
84872101443
-
Hi-Fi: Collecting high-fidelity whole-system provenance
-
December
-
D.J. Pohly, S. McLaughlin, P. McDaniel, K. Butler, Hi-Fi: Collecting high-fidelity whole-system provenance, in: Proc. of ACM ACSAC, December 2012.
-
(2012)
Proc. of ACM ACSAC
-
-
Pohly, D.J.1
McLaughlin, S.2
McDaniel, P.3
Butler, K.4
-
43
-
-
84988573115
-
The design and implementation of tripwire: A file system integrity checker
-
November
-
G.H. Kim, E.H. Spafford, The design and implementation of tripwire: A file system integrity checker, in: Proc. of ACM CCS, November 1994.
-
(1994)
Proc. of ACM CCS
-
-
Kim, G.H.1
Spafford, E.H.2
-
44
-
-
84971274615
-
Eidetic systems
-
D. Devecsery, M. Chow, X. Dou, J. Flinn, P.M. Chen, Eidetic systems, in: Proc. of USENIX OSDI, 2014.
-
(2014)
Proc. of USENIX OSDI
-
-
Devecsery, D.1
Chow, M.2
Dou, X.3
Flinn, J.4
Chen, P.M.5
-
45
-
-
77950788046
-
Panorama: Capturing system-wide information flow for malware detection and analysis
-
October
-
H. Yin, D. Song, M. Egele, C. Kruegel, E. Kirda, Panorama: Capturing system-wide information flow for malware detection and analysis, in: Proc. of ACM CCS, October 2007.
-
(2007)
Proc. of ACM CCS
-
-
Yin, H.1
Song, D.2
Egele, M.3
Kruegel, C.4
Kirda, E.5
-
46
-
-
49449113941
-
Design, implementation and evaluation of repairable file service
-
June
-
N. Zhu, T. Chiueh, Design, implementation and evaluation of repairable file service, in: Proc. of IEEE/IFIP DSN, June 2003.
-
(2003)
Proc. of IEEE/IFIP DSN
-
-
Zhu, N.1
Chiueh, T.2
-
47
-
-
0036709428
-
Recovery from malicious transactions
-
P. Ammann, S. Jajodia, and P. Liu Recovery from malicious transactions TKDE 14 5 2002 1167 1185
-
(2002)
TKDE
, vol.14
, Issue.5
, pp. 1167-1185
-
-
Ammann, P.1
Jajodia, S.2
Liu, P.3
-
48
-
-
11844249640
-
Revirt: Enabling intrusion analysis through virtual-machine logging and replay
-
G. Dunlap, S.T. King, S. Cinar, M.A. Basrai, P.M. Chen, Revirt: Enabling intrusion analysis through virtual-machine logging and replay, in: Proc. of USENIX OSDI, 2002.
-
Proc. of USENIX OSDI
, pp. 2002
-
-
Dunlap, G.1
King, S.T.2
Cinar, S.3
Basrai, M.A.4
Chen, P.M.5
-
49
-
-
85080362568
-
A virtual machine introspection based architecture for intrusion detection
-
T. Garfinkel, M. Rosenblum, A virtual machine introspection based architecture for intrusion detection, in: Proc. of NDSS, 2003.
-
(2003)
Proc. of NDSS
-
-
Garfinkel, T.1
Rosenblum, M.2
-
50
-
-
82655175514
-
Secure network provenance
-
October
-
W. Zhou, Q. Fei, A. Narayan, A. Haeberlen, B.T. Loo, M. Sherr, Secure network provenance, in: Proc. of ACM SOSP, October 2011.
-
(2011)
Proc. of ACM SOSP
-
-
Zhou, W.1
Fei, Q.2
Narayan, A.3
Haeberlen, A.4
Loo, B.T.5
Sherr, M.6
-
51
-
-
79959290588
-
Identifying the provenance of correlated anomalies
-
March
-
D. Tariq, B. Baig, A. Gehani, S. Mahmood, R. Tahir, A. Aqil, F. Zaffar, Identifying the provenance of correlated anomalies, in: Proc. of ACM SAC, March 2011.
-
(2011)
Proc. of ACM SAC
-
-
Tariq, D.1
Baig, B.2
Gehani, A.3
Mahmood, S.4
Tahir, R.5
Aqil, A.6
Zaffar, F.7
-
52
-
-
79951620528
-
Fine-grained tracking of grid infections
-
October
-
A. Gehani, B. Baig, S. Mahmood, D. Tariq, F. Zaffar, Fine-grained tracking of grid infections, in: Proc. of IEEE GRID, October 2010.
-
(2010)
Proc. of IEEE GRID
-
-
Gehani, A.1
Baig, B.2
Mahmood, S.3
Tariq, D.4
Zaffar, F.5
-
53
-
-
84899651024
-
Towards a secure and efficient system for end-to-end provenance
-
P. McDaniel, K. Butler, R. Sion, E. Zadok, M. Winslett, Towards a secure and efficient system for end-to-end provenance, in: Proc. of USENIX Tapp, 2010.
-
(2010)
Proc. of USENIX Tapp
-
-
McDaniel, P.1
Butler, K.2
Sion, R.3
Zadok, E.4
Winslett, M.5
-
56
-
-
80052666462
-
A formal framework for provenance security
-
J. Cheney, A formal framework for provenance security, in: Proc. of IEEE CSF, 2011.
-
(2011)
Proc. of IEEE CSF
-
-
Cheney, J.1
-
57
-
-
85026951967
-
Do you know where your data's been? - Tamper-evident database provenance
-
J. Zhang, A. Chapman, K. Lefevre, Do you know where your data's been? - tamper-evident database provenance, in: Proc. of SDM, 2010.
-
(2010)
Proc. of SDM
-
-
Zhang, J.1
Chapman, A.2
Lefevre, K.3
-
58
-
-
85076270528
-
Trustworthy whole-system provenance for the linux kernel
-
A. Bates, D. Tian, K. Butler, T. Moyer, Trustworthy whole-system provenance for the linux kernel, in: Proc. of USENIX Security, 2015.
-
(2015)
Proc. of USENIX Security
-
-
Bates, A.1
Tian, D.2
Butler, K.3
Moyer, T.4
-
59
-
-
84897743314
-
Secure provenance transmission for streaming data
-
S. Sultana, M. Shehab, and E. Bertino Secure provenance transmission for streaming data IEEE TKDE 25 8 2012 1890 1903
-
(2012)
IEEE TKDE
, vol.25
, Issue.8
, pp. 1890-1903
-
-
Sultana, S.1
Shehab, M.2
Bertino, E.3
-
60
-
-
84874905603
-
Towards secure provenance-based access control in cloud environments
-
A. Bates, B. Mood, M. Valafar, K. Butler, Towards secure provenance-based access control in cloud environments, in: Proc. of CODASPY, 2013.
-
(2013)
Proc. of CODASPY
-
-
Bates, A.1
Mood, B.2
Valafar, M.3
Butler, K.4
-
61
-
-
77954472312
-
Secure provenance: The essential of bread and butter of data forensics in cloud computing
-
April
-
R. Lu, X. Lin, X. Liang, X. Shen, Secure provenance: The essential of bread and butter of data forensics in cloud computing, in: Proc. of ACM ASIACCS, April 2010.
-
(2010)
Proc. of ACM ASIACCS
-
-
Lu, R.1
Lin, X.2
Liang, X.3
Shen, X.4
-
63
-
-
0024610919
-
A tutorial on hidden Markov models and selected applications in speech recognition
-
L.R. Rabiner A tutorial on hidden Markov models and selected applications in speech recognition Proc. IEEE 77 2 1989 257 286
-
(1989)
Proc. IEEE
, vol.77
, Issue.2
, pp. 257-286
-
-
Rabiner, L.R.1
|