2023
Defeasible-PROV: Conflict Resolution in Smart Building Devices.
Proceedings of the 47th IEEE Annual Computers, Software, and Applications Conference, 2023
Detecting VoIP Data Streams: Approaches Using Hidden Representation Learning.
Proceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence, 2023
2022
Flurry: a Fast Framework for Reproducible Multi-layered Provenance Graph Representation Learning.
CoRR, 2022
Deep Packet Inspection at Scale: Search Optimization Through Locality-Sensitive Hashing.
Proceedings of the 21st IEEE International Symposium on Network Computing and Applications, 2022
Flurry: A Fast Framework for Provenance Graph Generation for Representation Learning.
Proceedings of the 31st ACM International Conference on Information & Knowledge Management, 2022
2021
PROV-GEM: Automated Provenance Analysis Framework using Graph Embeddings.
Proceedings of the 20th IEEE International Conference on Machine Learning and Applications, 2021
OPD: Network Packet Distribution after Achieving Equilibrium to Mitigate DDOS Attack.
Proceedings of the IEEE 45th Annual Computers, Software, and Applications Conference, 2021
2019
Detecting Safety and Security Faults in PLC Systems with Data Provenance.
CoRR, 2019
IoTC<sup>2</sup>: A Formal Method Approach for Detecting Conflicts in Large Scale IoT Systems.
Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, 2019
2018
IoTC2: A Formal Method Approach for Detecting Conflicts in Large Scale IoT Systems.
CoRR, 2018
Curator: Provenance Management for Modern Distributed Systems.
Proceedings of the 10th USENIX Workshop on the Theory and Practice of Provenance, 2018
Towards Scalable Cluster Auditing through Grammatical Inference over Provenance Graphs.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018
Runtime Analysis of Whole-System Provenance.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
2017
Taming the Costs of Trustworthy Provenance through Policy Reduction.
ACM Trans. Internet Techn., 2017
Transparent Web Service Auditing via Network Provenance Functions.
Proceedings of the 26th International Conference on World Wide Web, 2017
Automated Provenance Analytics: A Regular Grammar Based Approach with Applications in Security.
Proceedings of the 9th USENIX Workshop on the Theory and Practice of Provenance, 2017
Practical whole-system provenance capture.
Proceedings of the 2017 Symposium on Cloud Computing, SoCC 2017, Santa Clara, CA, USA, 2017
2016
Navy Enhanced Sierra Mechanics (NESM): Toolbox for Predicting Navy Shock and Damage.
Comput. Sci. Eng., 2016
High-throughput Ingest of Provenance Records into Accumulo.
CoRR, 2016
Retrofitting Applications with Provenance-Based Security Monitoring.
CoRR, 2016
Leveraging Data Provenance to Enhance Cyber Resilience.
Proceedings of the IEEE Cybersecurity Development, 2016
High-throughput ingest of data provenance records into Accumulo.
Proceedings of the 2016 IEEE High Performance Extreme Computing Conference, 2016
Bootstrapping and maintaining trust in the cloud.
Proceedings of the 32nd Annual Conference on Computer Security Applications, 2016
2015
Trustworthy Whole-System Provenance for the Linux Kernel.
Proceedings of the 24th USENIX Security Symposium, 2015
Take Only What You Need: Leveraging Mandatory Access Control Policy to Reduce Provenance Storage Costs.
Proceedings of the 7th USENIX Workshop on the Theory and Practice of Provenance, 2015
2012
Scalable Web Content Attestation.
IEEE Trans. Computers, 2012
Scalable Integrity-Guaranteed AJAX.
Proceedings of the Web Technologies and Applications - 14th Asia-Pacific Web Conference, 2012
2011
Network-Based Root of Trust for Installation.
IEEE Secur. Priv., 2011
2010
New Security Architectures Based on Emerging Disk Functionality.
IEEE Secur. Priv., 2010
An architecture for enforcing end-to-end access control over web applications.
Proceedings of the 15th ACM Symposium on Access Control Models and Technologies, 2010
Seeding clouds with trust anchors.
Proceedings of the 2nd ACM Cloud Computing Security Workshop, 2010
2009
Configuration management at massive scale: system design and experience.
IEEE J. Sel. Areas Commun., 2009
Justifying Integrity Using a Virtual Machine Verifier.
Proceedings of the Twenty-Fifth Annual Computer Security Applications Conference, 2009