关注
Le Yu
Le Yu
在 purdue.edu 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
{ATLAS}: A sequence-based learning approach for attack investigation
A Alsaheel, Y Nan, S Ma, L Yu, G Walkup, ZB Celik, X Zhang, D Xu
30th USENIX security symposium (USENIX security 21), 3005-3022, 2021
1572021
ALchemist: Fusing Application and Audit Logs for Precise Attack Provenance without Instrumentation.
L Yu, S Ma, Z Zhang, G Tao, X Zhang, D Xu, VE Urias, HW Lin, ...
NDSS, 2021
372021
PEM: Representing Binary Program Semantics for Similarity Analysis via a Probabilistic Execution Model
X Xu, Z Xuan, S Feng, S Cheng, Y Ye, Q Shi, G Tao, L Yu, Z Zhang, ...
Proceedings of the 31st ACM Joint European Software Engineering Conference …, 2023
12023
ParDiff: Practical Static Differential Analysis of Network Protocol Parsers
M Zheng, Q Shi, X Liu, X Xu, L Yu, C Liu, G Wei, X Zhang
Proceedings of the ACM on Programming Languages 8 (OOPSLA1), 1208-1234, 2024
2024
Cost-effective Attack Forensics by Recording and Correlating File System Changes
L Yu, Y Ye, Z Zhang, X Zhang
Usenix Security 24, 0
系统目前无法执行此操作,请稍后再试。
文章 1–5