1 code implementation • 9 Aug 2023 • Zijun Cheng, Qiujian Lv, Jinyuan Liang, Yan Wang, Degang Sun, Thomas Pasquier, Xueyuan Han
Sifting through their design documents, we identify four common dimensions that drive the development of provenance-based intrusion detection systems (PIDSes): scope (can PIDSes detect modern attacks that infiltrate across application boundaries?
no code implementations • 26 Aug 2020 • Xueyuan Han, Xiao Yu, Thomas Pasquier, Ding Li, Junghwan Rhee, James Mickens, Margo Seltzer, Haifeng Chen
We introduce SIGL, a new tool for detecting malicious behavior during software installation.
1 code implementation • 18 Aug 2018 • Thomas Pasquier, Xueyuan Han, Thomas Moyer, Adam Bates, Olivier Hermant, David Eyers, Jean Bacon, Margo Seltzer
Identifying the root cause and impact of a system intrusion remains a foundational challenge in computer security.
Cryptography and Security Operating Systems