Xueyuan Vanbastelaer
Xueyuan Vanbastelaer
Home
Experience
Publications
Teaching
Contact
Light
Dark
Automatic
Mimicry Attacks
Sometimes, You Aren’t What You Do: Mimicry Attacks against Provenance Graph Host Intrusion Detection Systems
Reliable methods for host-layer intrusion detection remained an open problem within computer security. Recent research has recast …
Akul Goyal
,
Xueyuan Michael Han-Vanbastelaer
,
Gang Wang
,
Adam Bates
PDF
Cite
DOI
Code
Cite
×