Papers
Communities
Events
Blog
Pricing
Search
Open menu
Home
Papers
1808.06049
Cited By
v1
v2 (latest)
Runtime Analysis of Whole-System Provenance
18 August 2018
Thomas Pasquier
Xueyuan Han
Thomas Moyer
Adam Bates
O. Hermant
David Eyers
J. Bacon
Margo Seltzer
Re-assign community
ArXiv (abs)
PDF
HTML
Papers citing
"Runtime Analysis of Whole-System Provenance"
15 / 15 papers shown
Title
TriPSS: A Tri-Modal Keyframe Extraction Framework Using Perceptual, Structural, and Semantic Representations
Mert Can Cakmak
Nitin Agarwal
Diwash Poudel
31
0
0
03 Jun 2025
Slot: Provenance-Driven APT Detection through Graph Reinforcement Learning
Wei Qiao
Yebo Feng
Teng Li
Zijian Zhang
Yulong Shen
Zhuo Ma
Yulong Shen
135
0
0
23 Oct 2024
ProvLight: Efficient Workflow Provenance Capture on the Edge-to-Cloud Continuum
Daniel Rosendo
M. Mattoso
Alexandru Costan
Renan Souza
Débora B. Pina
P. Valduriez
Gabriel Antoniu
56
6
0
20 Jul 2023
Designing a Provenance Analysis for SGX Enclaves
Flavio Toffalini
Mathias Payer
Jianying Zhou
Lorenzo Cavallaro
46
4
0
15 Jun 2022
Secure Namespaced Kernel Audit for Containers
S. Lim
Bogdan Stelea
Xueyuan Han
Thomas Pasquier
49
19
0
03 Nov 2021
Proactive Provenance Policies for Automatic Cryptographic Data Centric Security
Shamaria Engram
Tyler Kaczmarek
Alice Lee
David Bigelow
46
1
0
31 May 2021
Enabling Efficient Cyber Threat Hunting With Cyber Threat Intelligence
Peng Gao
Fei Shao
Xiaoyuan Liu
Xusheng Xiao
Zheng Qin
Fengyuan Xu
Prateek Mittal
Sanjeev R. Kulkarni
Basel Alomair
63
88
0
26 Oct 2020
SIGL: Securing Software Installations Through Deep Graph Learning
Xueyuan Han
Xiao Yu
Thomas Pasquier
Ding Li
J. Rhee
James W. Mickens
Margo Seltzer
Haifeng Chen
85
52
0
26 Aug 2020
Threat Detection and Investigation with System-level Provenance Graphs: A Survey
Zhenyuan Li
Qi Alfred Chen
Runqing Yang
Yan Chen
71
85
0
02 Jun 2020
Xanthus: Push-button Orchestration of Host Provenance Data Collection
Xueyuan Han
James W. Mickens
Ashish Gehani
Margo Seltzer
Thomas Pasquier
25
7
0
10 May 2020
UNICORN: Runtime Provenance-Based Detector for Advanced Persistent Threats
Xueyuan Han
Thomas Pasquier
Adam Bates
James W. Mickens
Margo Seltzer
114
287
0
06 Jan 2020
POIROT: Aligning Attack Behavior with Kernel Audit Records for Cyber Threat Hunting
Sadegh M. Milajerdi
Birhanu Eshete
Rigel Gjomemo
V. Venkatakrishnan
43
215
0
30 Sep 2019
ProvMark: A Provenance Expressiveness Benchmarking System
Sheung Chi Chan
James Cheney
Pramod Bhatotia
Thomas Pasquier
Ashish Gehani
Hassaan Irshad
Lucian Carata
Margo Seltzer
49
8
0
24 Sep 2019
AppMine: Behavioral Analytics for Web Application Vulnerability Detection
Indranil Jana
Alina Oprea
24
9
0
06 Aug 2019
HOLMES: Real-time APT Detection through Correlation of Suspicious Information Flows
Sadegh M. Milajerdi
Rigel Gjomemo
Birhanu Eshete
R. Sekar
V. Venkatakrishnan
80
406
0
03 Oct 2018
1