Xueyuan Han

Orcid: 0000-0003-1374-153X

According to our database1, Xueyuan Han authored at least 19 papers between 2016 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Hermes: Memory-Efficient Pipeline Inference for Large Models on Edge Devices.
CoRR, 2024

Securing Monolithic Kernels using Compartmentalization.
CoRR, 2024

FetchBPF: Customizable Prefetching Policies in Linux with eBPF.
Proceedings of the 2024 USENIX Annual Technical Conference, 2024

Kairos: Practical Intrusion Detection and Investigation using Whole-system Provenance.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

SafeBPF: Hardware-assisted Defense-in-depth for eBPF Kernel Extensions.
Proceedings of the 2024 on Cloud Computing Security Workshop, 2024

2023
Unleashing Unprivileged eBPF Potential with Dynamic Sandboxing.
Proceedings of the 1st Workshop on eBPF and Kernel Extensions, 2023

Sometimes, You Aren't What You Do: Mimicry Attacks against Provenance Graph Host Intrusion Detection Systems.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023

Splice: Efficiently Removing a User's Data from In-memory Application State.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

2021
SIGL: Securing Software Installations Through Deep Graph Learning.
Proceedings of the 30th USENIX Security Symposium, 2021

Secure Namespaced Kernel Audit for Containers.
Proceedings of the SoCC '21: ACM Symposium on Cloud Computing, 2021

2020
Unicorn: Runtime Provenance-Based Detector for Advanced Persistent Threats.
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020

Xanthus: Push-button Orchestration of Host Provenance Data Collection.
Proceedings of the 3rd International Workshop on Practical Reproducible Evaluation of Computer Systems, 2020

2018
Sharing and Preserving Computational Analyses for Posterity with encapsulator.
Comput. Sci. Eng., 2018

Provenance-based Intrusion Detection: Opportunities and Challenges.
Proceedings of the 10th USENIX Workshop on the Theory and Practice of Provenance, 2018

Runtime Analysis of Whole-System Provenance.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
FRAPpuccino: Fault-detection through Runtime Analysis of Provenance.
Proceedings of the 9th USENIX Workshop on Hot Topics in Cloud Computing, 2017

Practical whole-system provenance capture.
Proceedings of the 2017 Symposium on Cloud Computing, SoCC 2017, Santa Clara, CA, USA, 2017

Automated debugging in data-intensive scalable computing.
Proceedings of the 2017 Symposium on Cloud Computing, SoCC 2017, Santa Clara, CA, USA, 2017

2016
Interactive Debugging for Big Data Analytics.
Proceedings of the 8th USENIX Workshop on Hot Topics in Cloud Computing, 2016


  Loading...