Author of the publication

RAIN: Refinable Attack Investigation with On-demand Inter-Process Information Flow Tracking.

, , , , , , , and . CCS, page 377-390. ACM, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Heterogeneous networking: a new survivability paradigm., , , , and . NSPW, page 33-39. ACM, (2001)Hotspot-based traceback for mobile ad hoc networks., and . Workshop on Wireless Security, page 43-54. ACM, (2005)Understanding the prevalence and use of alternative plans in malware with network games., , , and . ACSAC, page 1-10. ACM, (2011)An assessment of VoIP covert channel threats., and . SecureComm, page 371-380. IEEE, (2007)Measuring and Preventing Supply Chain Attacks on Package Managers., , , , , and . CoRR, (2020)RecProv: Towards Provenance-Aware User Space Record and Replay., , and . IPAW, volume 9672 of Lecture Notes in Computer Science, page 3-15. Springer, (2016)Using artificial anomalies to detect unknown and known network intrusions., , , , and . Knowl. Inf. Syst., 6 (5): 507-527 (2004)RAIN: Refinable Attack Investigation with On-demand Inter-Process Information Flow Tracking., , , , , , , and . CCS, page 377-390. ACM, (2017)Your Online Interests: Pwned! A Pollution Attack Against Targeted Advertising., , , , and . ACM Conference on Computer and Communications Security, page 129-140. ACM, (2014)Beheading hydras: performing effective botnet takedowns., , , , and . ACM Conference on Computer and Communications Security, page 121-132. ACM, (2013)