UISCOPE: Accurate, Instrumentation-free, and Visible Attack Investigation for GUI Applications

作者: Runqing Yang , Shiqing Ma , Haitao Xu , Xiangyu Zhang , Yan Chen

DOI: 10.14722/NDSS.2020.24329

关键词: Computer hardwareComputer scienceInstrumentation (computer programming)

摘要:

参考文章(17)
Dominic G. Lucchetti, Peter M. Chen, Zhuoqing Morley Mao, Samuel T. King, Enriching Intrusion Alerts Through Multi-Host Causality. network and distributed system security symposium. ,(2005)
Kiran-Kumar Muniswamy-Reddy, David A. Holland, Uri Braun, Margo Seltzer, Provenance-aware storage systems usenix annual technical conference. pp. 4- 4 ,(2006)
Brendan Saltaformaggio, Dongyan Xu, Zhongshu Gu, Xiangyu Zhang, DSCRETE: automatic rendering of forensic information from memory images via application logic reuse usenix security symposium. pp. 255- 269 ,(2014)
Shiqing Ma, Kyu Hyung Lee, Chung Hwan Kim, Junghwan Rhee, Xiangyu Zhang, Dongyan Xu, Accurate, Low Cost and Instrumentation-Free Security Audit Logging for Windows annual computer security applications conference. pp. 401- 410 ,(2015) , 10.1145/2818000.2818039
Samuel T. King, Peter M. Chen, Backtracking intrusions symposium on operating systems principles. pp. 223- 236 ,(2003) , 10.1145/1165389.945467
Dongyan Xu, Xiangyu Zhang, Kyu Hyung Lee, High Accuracy Attack Provenance via Binary-based Execution Partition. network and distributed system security symposium. ,(2013)
Kexin Pei, Zhongshu Gu, Brendan Saltaformaggio, Shiqing Ma, Fei Wang, Zhiwei Zhang, Luo Si, Xiangyu Zhang, Dongyan Xu, HERCULE: attack story reconstruction via community discovery on correlated log graph annual computer security applications conference. pp. 583- 595 ,(2016) , 10.1145/2991079.2991122
Shiqing Ma, Xiangyu Zhang, Dongyan Xu, ProTracer: Towards Practical Provenance Tracing by Alternating Between Logging and Tainting. network and distributed system security symposium. ,(2016) , 10.14722/NDSS.2016.23350
Dongyan Xu, Xiangyu Zhang, Kyu Hyung Lee, Shiqing Ma, Fei Wang, Juan Zhai, MPI: multiple perspective attack investigation with semantics aware execution partitioning usenix security symposium. pp. 1111- 1128 ,(2017)
Wajih Ul Hassan, Mark Lemay, Nuraini Aguse, Adam Bates, Thomas Moyer, Towards Scalable Cluster Auditing through Grammatical Inference over Provenance Graphs. network and distributed system security symposium. ,(2018) , 10.14722/NDSS.2018.23141