Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleNovember 2024
6G-XSec: Explainable Edge Security for Emerging OpenRAN Architectures
HotNets '24: Proceedings of the 23rd ACM Workshop on Hot Topics in NetworksPages 77–85https://doi.org/10.1145/3696348.3696881The evolution from 5G to 6G cellular networks signifies a crucial advancement towards enhanced robustness and automation driven by the promise of ubiquitous Artificial Intelligence (AI) to overhaul network operations, commonly referred to as AIOps. ...
- research-articleNovember 2024
SoK: Software Debloating Landscape and Future Directions
FEAST '24: Proceedings of the 2024 Workshop on Forming an Ecosystem Around Software TransformationPages 11–18https://doi.org/10.1145/3689937.3695792Software debloating seeks to mitigate security risks and improve performance by eliminating unnecessary code. In recent years, a plethora of debloating tools have been developed, creating a dense and varied landscape. Several studies have delved into the ...
- research-articleAugust 2023
Towards Reproducible Ransomware Analysis
- Shozab Hussain,
- Muhammad Musa,
- Turyal Neeshat,
- Rja Batool,
- Omer Ahmed,
- Fareed Zaffar,
- Ashish Gehani,
- Andy Poggio,
- Maneesh K. Yadav
CSET '23: Proceedings of the 16th Cyber Security Experimentation and Test WorkshopPages 1–9https://doi.org/10.1145/3607505.3607510Ransomware attacks continue to be a prominent cybersecurity threat and the subject of considerable research activity. Despite frequent high profile public reports of ransomware attacks, we found a paucity of tangible open behavioral activity data for ...
- short-paperApril 2023
Querying Container Provenance
WWW '23 Companion: Companion Proceedings of the ACM Web Conference 2023Pages 1564–1567https://doi.org/10.1145/3543873.3587568Containers are lightweight mechanisms for the isolation of operating system resources. They are realized by activating a set of namespaces. Given the use of containers in scientific computing, tracking and managing provenance within and across containers ...
-
- research-articleApril 2023
autoMPI: Automated Multiple Perspective Attack Investigation With Semantics Aware Execution Partitioning
- Mohannad Alhanahnah,
- Shiqing Ma,
- Ashish Gehani,
- Gabriela F. Ciocarlie,
- Vinod Yegneswaran,
- Somesh Jha,
- Xiangyu Zhang
IEEE Transactions on Software Engineering (ISOF), Volume 49, Issue 4Pages 2761–2775https://doi.org/10.1109/TSE.2022.3231242Multiple Perspective attack Investigation (<sc>MPI</sc>) is a technique to partition application dependencies based on high-level semantics. It facilitates provenance analysis by generating succinct causal graphs. It involves an annotation process that ...
- research-articleMarch 2023
OCCAM-v2: Combining Static and Dynamic Analysis for Effective and Efficient Whole-Program Specialization
Leveraging scalable pointer analysis, value analysis, and dynamic analysis.
- research-articleNovember 2022
OCCAM-v2: Combining Static and Dynamic Analysis for Effective and Efficient Whole-program Specialization: Leveraging scalable pointer analysis, value analysis, and dynamic analysis
OCCAM-v2 leverages scalable pointer analysis, value analysis, and dynamic analysis to create an effective and efficient tool for specializing LLVM bitcode. The extent of the code-size reduction achieved depends on the specific deployment configuration. ...
- short-paperJanuary 2023
Trimmer: Context-Specific Code Reduction
ASE '22: Proceedings of the 37th IEEE/ACM International Conference on Automated Software EngineeringArticle No.: 168, Pages 1–5https://doi.org/10.1145/3551349.3559529We present Trimmer, a state-of-the-art tool for reducing code size. Trimmer reduces code sizes by specializing programs with respect to constant inputs provided by developers. The static data can be provided as command-line options or through ...
CHEX: multiversion replay with ordered checkpoints
Proceedings of the VLDB Endowment (PVLDB), Volume 15, Issue 6Pages 1297–1310https://doi.org/10.14778/3514061.3514075In scientific computing and data science disciplines, it is often necessary to share application workflows and repeat results. Current tools containerize application workflows, and share the resulting container for repeating results. These tools, due to ...
- research-articleNovember 2021
Digging into big provenance (with SPADE)
A user interface for querying provenance.
- research-articleJuly 2021
Digging into Big Provenance (with SPADE): A user interface for querying provenance
Several interfaces exist for querying provenance. Many are not flexible in allowing users to select a database type of their choice. Some provide query functionality in a data model that is different from the graph-oriented one that is natural for ...
- short-paperJune 2020
Xanthus: Push-button Orchestration of Host Provenance Data Collection
P-RECS '20: Proceedings of the 3rd International Workshop on Practical Reproducible Evaluation of Computer SystemsPages 27–32https://doi.org/10.1145/3391800.3398175Host-based anomaly detectors generate alarms by inspecting audit logs for suspicious behavior. Unfortunately, evaluating these anomaly detectors is hard. There are few high-quality, publicly-available audit logs, and there are no pre-existing frameworks ...
- short-paperJune 2020
MiDas: Containerizing Data-Intensive Applications with I/O Specialization
P-RECS '20: Proceedings of the 3rd International Workshop on Practical Reproducible Evaluation of Computer SystemsPages 21–25https://doi.org/10.1145/3391800.3398174Scientific applications often depend on data produced from computational models. Model-generated data can be prohibitively large. Current mechanisms for sharing and distributing reproducible applications, such as containers, assume all model data is ...
- research-articleJune 2020
Efficient provenance alignment in reproduced executions
TAPP'20: Proceedings of the 12th USENIX Conference on Theory and Practice of ProvenanceArticle No.: 6, Page 6Reproducing experiments entails repeating experiments with changes. Changes, such as a change in input arguments, a change in the invoking environment, or a change due to nondeterminism in the runtime may alter results. If results alter significantly, ...
- research-articleJune 2020
Discrepancy detection in whole network provenance
TAPP'20: Proceedings of the 12th USENIX Conference on Theory and Practice of ProvenanceArticle No.: 5, Page 5Data provenance describes the origins of a digital object. Such information is particularly useful when analyzing distributed workflows because extant tools, such as debuggers and application profilers, do not support tracing through heterogeneous ...
- research-articleJune 2020
Integrity checking and abnormality detection of provenance records
TAPP'20: Proceedings of the 12th USENIX Conference on Theory and Practice of ProvenanceArticle No.: 2, Page 2Data provenance is a kind of meta-data recording inputs, entities and processes. It provides historical records and origin information of the data. Because of the rich information provided, provenance is increasingly being used as a foundation for ...
- research-articleDecember 2019
ProvMark: A Provenance Expressiveness Benchmarking System
- Sheung Chi Chan,
- James Cheney,
- Pramod Bhatotia,
- Thomas Pasquier,
- Ashish Gehani,
- Hassaan Irshad,
- Lucian Carata,
- Margo Seltzer
Middleware '19: Proceedings of the 20th International Middleware ConferencePages 268–279https://doi.org/10.1145/3361525.3361552System level provenance is of widespread interest for applications such as security enforcement and information protection. However, testing the correctness or completeness of provenance capture tools is challenging and currently done manually. In some ...
- ArticleJune 2019
Longitudinal Analysis of Misuse of Bitcoin
AbstractWe conducted a longitudinal study to analyze the misuse of Bitcoin. We first investigated usage characteristics of Bitcoin by analyzing how many addresses each address transacts with (from January 2009 to May 2018). To obtain a quantitative ...
- ArticleJune 2019
Mining data provenance to detect advanced persistent threats
An advanced persistent threat (APT) is a stealthy malware instance that gains unauthorized access to a system and remains undetected for an extended time period. The aim of this work is to evaluate the feasibility of applying advanced machine learning ...