Conan: A Practical Real-Time APT Detection System With High Accuracy and Efficiency C Xiong, T Zhu, W Dong, L Ruan, R Yang, Y Cheng, Y Chen, S Cheng, ... IEEE Transactions on Dependable and Secure Computing 19 (1), 551-565, 2020 | 70 | 2020 |
Effective and light-weight deobfuscation and semantic-aware attack detection for powershell scripts Z Li, QA Chen, C Xiong, Y Chen, T Zhu, H Yang Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019 | 41 | 2019 |
General, efficient, and real-time data compaction strategy for APT forensic analysis T Zhu, J Wang, L Ruan, C Xiong, J Yu, Y Li, Y Chen, M Lv, T Chen IEEE Transactions on Information Forensics and Security 16, 3312-3325, 2021 | 23 | 2021 |
RATScope: Recording and Reconstructing Missing RAT Semantic Behaviors for Forensic Analysis on Windows R Yang, X Chen, H Xu, Y Cheng, C Xiong, L Ruan, M Kavousi, Z Li, L Xu, ... IEEE Transactions on Dependable and Secure Computing 19 (3), 1621-1638, 2020 | 16 | 2020 |
{PROGRAPHER}: An Anomaly Detection System based on Provenance Graph Embedding F Yang, J Xu, C Xiong, Z Li, K Zhang 32nd USENIX Security Symposium (USENIX Security 23), 4355-4372, 2023 | 15 | 2023 |
APTSHIELD: A Stable, Efficient and Real-Time APT Detection System for Linux Hosts T Zhu, J Yu, C Xiong, W Cheng, Q Yuan, J Ying, T Chen, J Zhang, M Lv, ... IEEE Transactions on Dependable and Secure Computing 20 (6), 5247-5264, 2023 | 11 | 2023 |
Generic, efficient, and effective deobfuscation and semantic-aware attack detection for PowerShell scripts C Xiong, Z Li, Y Chen, T Zhu, J Wang, H Yang, W Ruan Frontiers of Information Technology & Electronic Engineering 23 (3), 361-381, 2022 | 6 | 2022 |
System-Level Data Management for Endpoint Advanced Persistent Threat Detection: Issues, Challenges and Trends T Chen, C Zheng, T Zhu, C Xiong, J Ying, Q Yuan, W Cheng, M Lv Computers & Security, 103485, 2023 | 3 | 2023 |
Nip in the Bud: Forecasting and Interpreting Post-exploitation Attacks in Real-time through Cyber Threat Intelligence Reports T Zhu, J Ying, T Chen, C Xiong, W Cheng, Q Yuan, A Zheng, M Lv, ... arXiv preprint arXiv:2405.02826, 2024 | | 2024 |
SPARSE: Semantic Tracking and Path Analysis for Attack Investigation in Real-time J Ying, T Zhu, W Cheng, Q Yuan, M Ma, C Xiong, T Chen, M Lv, Y Chen arXiv preprint arXiv:2405.02629, 2024 | | 2024 |
TrapCog: An Anti-Noise, Transferable, and Privacy-Preserving Real-Time Mobile User Authentication System With High Accuracy J Ying, T Zhu, Q Liu, C Xiong, Z Weng, T Chen, L Fu, M Lv, H Wu, T Wang, ... IEEE Transactions on Mobile Computing 23 (4), 2832-2848, 2023 | | 2023 |
通用, 有效且轻量的 PowerShell 解混淆和语义敏感的攻击检测方法 C Xiong, Z Li, Y Chen, T Zhu, J Wang, H Yang, W Ruan, AC XIONG, AZ LI, ... Frontiers of Information Technology and Electronic Engineering 23 (3), 361-381, 2022 | | 2022 |
SSLINT: A Tool for Detecting TLS Certificate Validation Vulnerabilities B He, V Rastogi, Y Cao, Y Chen, VN Venkatakrishnan, C Xiong, R Yang, ... | | 2016 |
Privacy Enhanced Mobile User Authentication Method Using Motion Sensors C Xiong, Z Weng, J Liu, L Gu, F Alqahtani, A Gafar, PK Sharma | | |