关注
Chunlin Xiong
Chunlin Xiong
深信服博士后
在 sangfor.com.cn 的电子邮件经过验证
标题
引用次数
引用次数
年份
Conan: A Practical Real-Time APT Detection System With High Accuracy and Efficiency
C Xiong, T Zhu, W Dong, L Ruan, R Yang, Y Cheng, Y Chen, S Cheng, ...
IEEE Transactions on Dependable and Secure Computing 19 (1), 551-565, 2020
702020
Effective and light-weight deobfuscation and semantic-aware attack detection for powershell scripts
Z Li, QA Chen, C Xiong, Y Chen, T Zhu, H Yang
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
412019
General, efficient, and real-time data compaction strategy for APT forensic analysis
T Zhu, J Wang, L Ruan, C Xiong, J Yu, Y Li, Y Chen, M Lv, T Chen
IEEE Transactions on Information Forensics and Security 16, 3312-3325, 2021
232021
RATScope: Recording and Reconstructing Missing RAT Semantic Behaviors for Forensic Analysis on Windows
R Yang, X Chen, H Xu, Y Cheng, C Xiong, L Ruan, M Kavousi, Z Li, L Xu, ...
IEEE Transactions on Dependable and Secure Computing 19 (3), 1621-1638, 2020
162020
{PROGRAPHER}: An Anomaly Detection System based on Provenance Graph Embedding
F Yang, J Xu, C Xiong, Z Li, K Zhang
32nd USENIX Security Symposium (USENIX Security 23), 4355-4372, 2023
152023
APTSHIELD: A Stable, Efficient and Real-Time APT Detection System for Linux Hosts
T Zhu, J Yu, C Xiong, W Cheng, Q Yuan, J Ying, T Chen, J Zhang, M Lv, ...
IEEE Transactions on Dependable and Secure Computing 20 (6), 5247-5264, 2023
112023
Generic, efficient, and effective deobfuscation and semantic-aware attack detection for PowerShell scripts
C Xiong, Z Li, Y Chen, T Zhu, J Wang, H Yang, W Ruan
Frontiers of Information Technology & Electronic Engineering 23 (3), 361-381, 2022
62022
System-Level Data Management for Endpoint Advanced Persistent Threat Detection: Issues, Challenges and Trends
T Chen, C Zheng, T Zhu, C Xiong, J Ying, Q Yuan, W Cheng, M Lv
Computers & Security, 103485, 2023
32023
Nip in the Bud: Forecasting and Interpreting Post-exploitation Attacks in Real-time through Cyber Threat Intelligence Reports
T Zhu, J Ying, T Chen, C Xiong, W Cheng, Q Yuan, A Zheng, M Lv, ...
arXiv preprint arXiv:2405.02826, 2024
2024
SPARSE: Semantic Tracking and Path Analysis for Attack Investigation in Real-time
J Ying, T Zhu, W Cheng, Q Yuan, M Ma, C Xiong, T Chen, M Lv, Y Chen
arXiv preprint arXiv:2405.02629, 2024
2024
TrapCog: An Anti-Noise, Transferable, and Privacy-Preserving Real-Time Mobile User Authentication System With High Accuracy
J Ying, T Zhu, Q Liu, C Xiong, Z Weng, T Chen, L Fu, M Lv, H Wu, T Wang, ...
IEEE Transactions on Mobile Computing 23 (4), 2832-2848, 2023
2023
通用, 有效且轻量的 PowerShell 解混淆和语义敏感的攻击检测方法
C Xiong, Z Li, Y Chen, T Zhu, J Wang, H Yang, W Ruan, AC XIONG, AZ LI, ...
Frontiers of Information Technology and Electronic Engineering 23 (3), 361-381, 2022
2022
SSLINT: A Tool for Detecting TLS Certificate Validation Vulnerabilities
B He, V Rastogi, Y Cao, Y Chen, VN Venkatakrishnan, C Xiong, R Yang, ...
2016
Privacy Enhanced Mobile User Authentication Method Using Motion Sensors
C Xiong, Z Weng, J Liu, L Gu, F Alqahtani, A Gafar, PK Sharma
系统目前无法执行此操作,请稍后再试。
文章 1–14