Publications

(2024). [NEW!] KAIROS: Practical Intrusion Detection and Investigation using Whole-system Provenance. In S&P'24.

PDF Cite Code

(2023). [NEW!] Splice: Efficiently Removing a User’s Data from In-memory Application State. In CCS'23.

Cite

(2023). [NEW!] Unleashing Unprivileged eBPF Potential with Dynamic Sandboxing. In eBPF'23.

PDF Cite DOI

(2023). Sometimes, You Aren’t What You Do: Mimicry Attacks against Provenance Graph Host Intrusion Detection Systems. In NDSS'23.

PDF Cite DOI Code

(2021). Secure Namespaced Kernel Audit for Containers. In SoCC'21.

PDF Cite DOI Code

(2021). SIGL: Securing Software Installations Through Deep Graph Learning. In Security ‘21.

PDF Cite

(2020). Xanthus: Push-button Orchestration of Host Provenance Data Collection. In P-RECS'20.

PDF Cite DOI Code

(2020). Unicorn: Runtime Provenance-Based Detector for Advanced Persistent Threats. In NDSS'20.

PDF Cite DOI Code

(2018). Runtime Analysis of Whole-system Provenance. In CCS'18.

PDF Cite DOI Code

(2018). Provenance-based Intrusion Detection: Opportunities and Challenges. In TaPP'18.

PDF Cite

(2018). Sharing and Preserving Computational Analyses for Posterity with encapsulator. In CiSE.

PDF Cite DOI Code

(2017). Practical Whole-System Provenance Capture. In SoCC'17.

PDF Cite DOI Code

(2017). Automated Debugging in Data-intensive Scalable Computing. In SoCC'17.

PDF Cite DOI Code

(2017). FRAPpuccino: Fault-detection through Runtime Analysis of Provenance. In HotCloud'17.

PDF Cite Code

(2016). Interactive Debugging for Big Data Analytics. In HotCloud'16.

PDF Cite Code