Author of the publication

Trustworthy Whole-System Provenance for the Linux Kernel.

, , , and . USENIX Security Symposium, page 319-334. USENIX Association, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Ellipsis: Towards Efficient System Auditing for Real-Time Systems., , , , , and . CoRR, (2022)NoDoze: Combatting Threat Alert Fatigue with Automated Provenance Triage., , , , , , and . NDSS, The Internet Society, (2019)Custos: Practical Tamper-Evident Auditing of Operating Systems Using Trusted Execution., , , , , , and . NDSS, The Internet Society, (2020)Fear and Logging in the Internet of Things., , , and . NDSS, The Internet Society, (2018)Skill Squatting Attacks on Amazon Alexa., , , , , , and . USENIX Security Symposium, page 33-47. USENIX Association, (2018)Making USB Great Again with USBFILTER., , , , and . USENIX Security Symposium, page 415-430. USENIX Association, (2016)Provenance for Intent-Based Networking., , and . NetSoft, page 195-199. IEEE, (2020)Runtime Analysis of Whole-System Provenance., , , , , , , and . CCS, page 1601-1616. ACM, (2018)Validating the Integrity of Audit Logs Against Execution Repartitioning Attacks., , , , , and . CCS, page 3337-3351. ACM, (2021)Tactical Provenance Analysis for Endpoint Detection and Response Systems., , and . SP, page 1172-1189. IEEE, (2020)