Shadewatcher: Recommendation-guided cyber threat analysis using system audit records

J Zengy, X Wang, J Liu, Y Chen, Z Liang… - … IEEE Symposium on …, 2022 - ieeexplore.ieee.org
System auditing provides a low-level view into cyber threats by monitoring system entity
interactions. In response to advanced cyber-attacks, one prevalent solution is to apply data …

Sok: History is a vast early warning system: Auditing the provenance of system intrusions

MA Inam, Y Chen, A Goyal, J Liu, J Mink… - … IEEE Symposium on …, 2023 - ieeexplore.ieee.org
Auditing, a central pillar of operating system security, has only recently come into its own as
an active area of public research. This resurgent interest is due in large part to the notion of …

Risk taxonomy, mitigation, and assessment benchmarks of large language model systems

T Cui, Y Wang, C Fu, Y Xiao, S Li, X Deng, Y Liu… - arXiv preprint arXiv …, 2024 - arxiv.org
Large language models (LLMs) have strong capabilities in solving diverse natural language
processing tasks. However, the safety and security issues of LLM systems have become the …

A survey on the evolution of fileless attacks and detection techniques

S Liu, G Peng, H Zeng, J Fu - Computers & Security, 2023 - Elsevier
Fileless attacks have gained significant prominence and have become the prevailing type of
attack in recent years. The exceptional level of stealthiness and difficulty in detection …

Poison forensics: Traceback of data poisoning attacks in neural networks

S Shan, AN Bhagoji, H Zheng, BY Zhao - 31st USENIX Security …, 2022 - usenix.org
In adversarial machine learning, new defenses against attacks on deep learning systems
are routinely broken soon after their release by more powerful attacks. In this context …

The case for learned provenance graph storage systems

H Ding, J Zhai, D Deng, S Ma - 32nd USENIX Security Symposium …, 2023 - usenix.org
Cyberattacks are becoming more frequent and sophisticated, and investigating them
becomes more challenging. Provenance graphs are the primary data source to support …

Beagle: Forensics of deep learning backdoor attack for better defense

S Cheng, G Tao, Y Liu, S An, X Xu, S Feng… - arXiv preprint arXiv …, 2023 - arxiv.org
Deep Learning backdoor attacks have a threat model similar to traditional cyber attacks.
Attack forensics, a critical counter-measure for traditional cyber attacks, is hence of …

[PDF][PDF] eaudit: A fast, scalable and deployable audit data collection system

R Sekar, H Kimm, R Aich - 2024 IEEE Symposium on …, 2023 - seclab.cs.stonybrook.edu
Today's advanced cyber attack campaigns can often bypass all existing protections. The
primary defense against them is after-the-fact detection, followed by a forensic analysis to …

CMD: co-analyzed iot malware detection and forensics via network and hardware domains

Z Zhao, Z Li, J Yu, F Zhang, X Xie… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
With the widespread use of Internet of Things (IoT) devices, malware detection has become
a hot spot for both academic and industrial communities. Existing approaches can be …

Palantír: Optimizing attack provenance with hardware-enhanced system observability

J Zeng, C Zhang, Z Liang - Proceedings of the 2022 ACM SIGSAC …, 2022 - dl.acm.org
System auditing is the foundation of attack provenance to investigate root causes and
ramifications of cyber-attacks. However, provenance tracking on coarse-grained audit logs …