Folgen
Xueyuan Han
Xueyuan Han
Assistant Professor of Computer Science
Bestätigte E-Mail-Adresse bei wfu.edu - Startseite
Titel
Zitiert von
Zitiert von
Jahr
Unicorn: Runtime provenance-based detector for advanced persistent threats
X Han, T Pasquier, A Bates, J Mickens, M Seltzer
Network and Distributed System Security Symposium, 2020
2212020
Practical whole-system provenance capture
T Pasquier, X Han, M Goldstein, T Moyer, D Eyers, M Seltzer, J Bacon
Proceedings of the 2017 Symposium on Cloud Computing, 405-418, 2017
1632017
Runtime analysis of whole-system provenance
T Pasquier, X Han, T Moyer, A Bates, O Hermant, D Eyers, J Bacon, ...
Proceedings of the 2018 ACM SIGSAC conference on computer and communications …, 2018
992018
{FRAPpuccino}: Fault-detection through Runtime Analysis of Provenance
X Han, T Pasquier, T Ranjan, M Goldstein, M Seltzer
9th USENIX Workshop on Hot Topics in Cloud Computing (HotCloud 17), 2017
522017
Provenance-based intrusion detection: opportunities and challenges
X Han, T Pasquier, M Seltzer
10th USENIX Workshop on the Theory and Practice of Provenance (TaPP 2018), 2018
512018
{SIGL}: Securing software installations through deep graph learning
X Han, X Yu, T Pasquier, D Li, J Rhee, J Mickens, M Seltzer, H Chen
30th USENIX Security Symposium (USENIX Security 21), 2345-2362, 2021
372021
Automated debugging in data-intensive scalable computing
MA Gulzar, M Interlandi, X Han, M Li, T Condie, M Kim
Proceedings of the 2017 Symposium on Cloud Computing, 520-534, 2017
332017
Sharing and preserving computational analyses for posterity with encapsulator
T Pasquier, MK Lau, X Han, E Fong, BS Lerner, ER Boose, M Crosas, ...
Computing in Science & Engineering 20 (4), 111-124, 2018
162018
Interactive debugging for big data analytics
MA Gulzar, X Han, M Interlandi, S Mardani, SD Tetali, T Millstein, M Kim
8th USENIX Workshop on Hot Topics in Cloud Computing (HotCloud 16), 2016
102016
Secure namespaced kernel audit for containers
SY Lim, B Stelea, X Han, T Pasquier
Proceedings of the ACM Symposium on Cloud Computing, 518-532, 2021
92021
Sometimes, You Aren’t What You Do: Mimicry Attacks against Provenance Graph Host Intrusion Detection Systems
A Goyal, X Han, G Wang, A Bates
Network and Distributed System Security Symposium, 2023
72023
Xanthus: Push-button orchestration of host provenance data collection
X Han, J Mickens, A Gehani, M Seltzer, T Pasquier
Proceedings of the 3rd International Workshop on Practical Reproducible …, 2020
72020
Unleashing unprivileged ebpf potential with dynamic sandboxing
SY Lim, X Han, T Pasquier
Proceedings of the 1st Workshop on eBPF and Kernel Extensions, 42-48, 2023
42023
Kairos:: Practical Intrusion Detection and Investigation using Whole-system Provenance
Z Cheng, Q Lv, J Liang, Y Wang, D Sun, T Pasquier, X Han
arXiv preprint arXiv:2308.05034, 2023
22023
Securing software installation through deep graph learning
X Yu, X Han, D Li, J Rhee, H Chen
US Patent 11,321,066, 2022
22022
Securing Monolithic Kernels using Compartmentalization
SY Lim, S Agrawal, X Han, D Eyers, D O'Keeffe, T Pasquier
arXiv preprint arXiv:2404.08716, 2024
2024
Splice: Efficiently Removing a User's Data from In-memory Application State
X Han, J Mickens, S Sen
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications …, 2023
2023
Poster: Sometimes, You Aren’t What You Do: Mimicry Attacks against Provenance Graph Host Intrusion Detection Systems
A Goyal, X Han, G Wang, A Bates
Using Provenance for Security and Interpretability
X Han
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–19