Skip to main content

Showing 1–18 of 18 results for author: Pasquier, T

.
  1. arXiv:2404.08716  [pdf, other

    cs.CR cs.OS

    Securing Monolithic Kernels using Compartmentalization

    Authors: Soo Yee Lim, Sidhartha Agrawal, Xueyuan Han, David Eyers, Dan O'Keeffe, Thomas Pasquier

    Abstract: Monolithic operating systems, where all kernel functionality resides in a single, shared address space, are the foundation of most mainstream computer systems. However, a single flaw, even in a non-essential part of the kernel (e.g., device drivers), can cause the entire operating system to fall under an attacker's control. Kernel hardening techniques might prevent certain types of vulnerabilities… ▽ More

    Submitted 12 April, 2024; originally announced April 2024.

    Comments: 24 pages, 7 figures

  2. arXiv:2308.05034  [pdf, other

    cs.CR cs.LG

    Kairos: Practical Intrusion Detection and Investigation using Whole-system Provenance

    Authors: Zijun Cheng, Qiujian Lv, **yuan Liang, Yan Wang, Degang Sun, Thomas Pasquier, Xueyuan Han

    Abstract: Provenance graphs are structured audit logs that describe the history of a system's execution. Recent studies have explored a variety of techniques to analyze provenance graphs for automated host intrusion detection, focusing particularly on advanced persistent threats. Sifting through their design documents, we identify four common dimensions that drive the development of provenance-based intrusi… ▽ More

    Submitted 27 September, 2023; v1 submitted 9 August, 2023; originally announced August 2023.

    Comments: 24 pages, 16 figures, to appear in the 45th IEEE Symposium on Security and Privacy (S&P'24)

  3. arXiv:2308.01983  [pdf, other

    cs.OS cs.CR

    Unleashing Unprivileged eBPF Potential with Dynamic Sandboxing

    Authors: Soo Yee Lim, Xueyuan Han, Thomas Pasquier

    Abstract: For safety reasons, unprivileged users today have only limited ways to customize the kernel through the extended Berkeley Packet Filter (eBPF). This is unfortunate, especially since the eBPF framework itself has seen an increase in scope over the years. We propose SandBPF, a software-based kernel isolation technique that dynamically sandboxes eBPF programs to allow unprivileged users to safely ext… ▽ More

    Submitted 15 August, 2023; v1 submitted 3 August, 2023; originally announced August 2023.

    Comments: 8 pages, 5 figures, to appear in the 1st SIGCOMM Workshop on eBPF and Kernel Extensions

  4. arXiv:2212.08525  [pdf, other

    cs.CR eess.SY

    Resource-Interaction Graph: Efficient Graph Representation for Anomaly Detection

    Authors: James Pope, **yuan Liang, Vijay Kumar, Francesco Raimondo, Xinyi Sun, Ryan McConville, Thomas Pasquier, Rob Piechocki, George Oikonomou, Bo Luo, Dan Howarth, Ioannis Mavromatis, Adrian Sanchez Mompo, Pietro Carnelli, Theodoros Spyridopoulos, Aftab Khan

    Abstract: Security research has concentrated on converting operating system audit logs into suitable graphs, such as provenance graphs, for analysis. However, provenance graphs can grow very large requiring significant computational resources beyond what is necessary for many security tasks and are not feasible for resource constrained environments, such as edge devices. To address this problem, we present… ▽ More

    Submitted 16 December, 2022; originally announced December 2022.

    Comments: 15 pages, 11 figures, 6 tables, for dataset see https://github.com/jpope8/container-escape-dataset, for code see https://github.com/jpope8/container-escape-analysis

  5. arXiv:2111.02481  [pdf, other

    cs.CR

    Secure Namespaced Kernel Audit for Containers

    Authors: Soo Yee Lim, Bogdan Stelea, Xueyuan Han, Thomas Pasquier

    Abstract: Despite the wide usage of container-based cloud computing, container auditing for security analysis relies mostly on built-in host audit systems, which often lack the ability to capture high-fidelity container logs. State-of-the-art reference-monitor-based audit techniques greatly improve the quality of audit logs, but their system-wide architecture is too costly to be adapted for individual conta… ▽ More

    Submitted 3 November, 2021; originally announced November 2021.

    Comments: 15 pages, 7 figures

  6. arXiv:2103.12793  [pdf, other

    cs.SE cs.DL

    A large-scale study on research code quality and execution

    Authors: Ana Trisovic, Matthew K. Lau, Thomas Pasquier, Mercè Crosas

    Abstract: This article presents a study on the quality and execution of research code from publicly-available replication datasets at the Harvard Dataverse repository. Research code is typically created by a group of scientists and published together with academic papers to facilitate research transparency and reproducibility. For this study, we define ten questions to address aspects impacting research rep… ▽ More

    Submitted 23 March, 2021; originally announced March 2021.

    Comments: 30 pages

  7. arXiv:2008.11533  [pdf, other

    cs.CR cs.LG

    SIGL: Securing Software Installations Through Deep Graph Learning

    Authors: Xueyuan Han, Xiao Yu, Thomas Pasquier, Ding Li, Junghwan Rhee, James Mickens, Margo Seltzer, Haifeng Chen

    Abstract: Many users implicitly assume that software can only be exploited after it is installed. However, recent supply-chain attacks demonstrate that application integrity must be ensured during installation itself. We introduce SIGL, a new tool for detecting malicious behavior during software installation. SIGL collects traces of system call activity, building a data provenance graph that it analyzes usi… ▽ More

    Submitted 22 June, 2021; v1 submitted 26 August, 2020; originally announced August 2020.

    Comments: 18 pages, to appear in the 30th USENIX Security Symposium (USENIX Security '21)

  8. Xanthus: Push-button Orchestration of Host Provenance Data Collection

    Authors: Xueyuan Han, James Mickens, Ashish Gehani, Margo Seltzer, Thomas Pasquier

    Abstract: Host-based anomaly detectors generate alarms by inspecting audit logs for suspicious behavior. Unfortunately, evaluating these anomaly detectors is hard. There are few high-quality, publicly-available audit logs, and there are no pre-existing frameworks that enable push-button creation of realistic system traces. To make trace generation easier, we created Xanthus, an automated tool that orchestra… ▽ More

    Submitted 10 May, 2020; originally announced May 2020.

    Comments: 6 pages, 1 figure, 7 listings, 1 table, workshop

  9. arXiv:2001.08002  [pdf, ps, other

    cs.DC eess.SY

    Tuneful: An Online Significance-Aware Configuration Tuner for Big Data Analytics

    Authors: Ayat Fekry, Lucian Carata, Thomas Pasquier, Andrew Rice, Andy Hopper

    Abstract: Distributed analytics engines such as Spark are a common choice for processing extremely large datasets. However, finding good configurations for these systems remains challenging, with each workload potentially requiring a different setup to run optimally. Using suboptimal configurations incurs significant extra runtime costs. %Furthermore, Spark and similar platforms are gaining traction within… ▽ More

    Submitted 22 January, 2020; originally announced January 2020.

  10. UNICORN: Runtime Provenance-Based Detector for Advanced Persistent Threats

    Authors: Xueyuan Han, Thomas Pasquier, Adam Bates, James Mickens, Margo Seltzer

    Abstract: Advanced Persistent Threats (APTs) are difficult to detect due to their "low-and-slow" attack patterns and frequent use of zero-day exploits. We present UNICORN, an anomaly-based APT detector that effectively leverages data provenance analysis. From modeling to detection, UNICORN tailors its design specifically for the unique characteristics of APTs. Through extensive yet time-efficient graph anal… ▽ More

    Submitted 14 January, 2020; v1 submitted 6 January, 2020; originally announced January 2020.

    Comments: 19 pages

  11. ProvMark: A Provenance Expressiveness Benchmarking System

    Authors: Sheung Chi Chan, James Cheney, Pramod Bhatotia, Thomas Pasquier, Ashish Gehani, Hassaan Irshad, Lucian Carata, Margo Seltzer

    Abstract: System level provenance is of widespread interest for applications such as security enforcement and information protection. However, testing the correctness or completeness of provenance capture tools is challenging and currently done manually. In some cases there is not even a clear consensus about what behavior is correct. We present an automated tool, ProvMark, that uses an existing provenance… ▽ More

    Submitted 24 September, 2019; originally announced September 2019.

    Comments: To appear, Middleware 2019

  12. arXiv:1904.00156  [pdf, ps, other

    cs.CY cs.CR

    Viewpoint | Personal Data and the Internet of Things: It is time to care about digital provenance

    Authors: Thomas Pasquier, David Eyers, Jean Bacon

    Abstract: The Internet of Things promises a connected environment reacting to and addressing our every need, but based on the assumption that all of our movements and words can be recorded and analysed to achieve this end. Ubiquitous surveillance is also a precondition for most dystopian societies, both real and fictional. How our personal data is processed and consumed in an ever more connected world must… ▽ More

    Submitted 30 March, 2019; originally announced April 2019.

    Comments: 3 pages, 0 figures, preprint for Communication of the ACM

  13. arXiv:1808.06049  [pdf, other

    cs.CR cs.OS

    Runtime Analysis of Whole-System Provenance

    Authors: Thomas Pasquier, Xueyuan Han, Thomas Moyer, Adam Bates, Olivier Hermant, David Eyers, Jean Bacon, Margo Seltzer

    Abstract: Identifying the root cause and impact of a system intrusion remains a foundational challenge in computer security. Digital provenance provides a detailed history of the flow of information within a computing system, connecting suspicious events to their root causes. Although existing provenance-based auditing techniques provide value in forensic analysis, they assume that such analysis takes place… ▽ More

    Submitted 25 August, 2018; v1 submitted 18 August, 2018; originally announced August 2018.

    Comments: 16 pages, 12 figures, 25th ACM Conference on Computer and Communications Security 2018

  14. arXiv:1806.00934  [pdf, ps, other

    cs.CR eess.SY

    Provenance-based Intrusion Detection: Opportunities and Challenges

    Authors: Xueyuan Han, Thomas Pasquier, Margo Seltzer

    Abstract: Intrusion detection is an arms race; attackers evade intrusion detection systems by develo** new attack vectors to sidestep known defense mechanisms. Provenance provides a detailed, structured history of the interactions of digital objects within a system. It is ideal for intrusion detection, because it offers a holistic, attack-vector-agnostic view of system execution. As such, provenance graph… ▽ More

    Submitted 3 June, 2018; originally announced June 2018.

    Comments: 4 pages, TaPP'18

  15. arXiv:1803.05808  [pdf, other

    cs.DL

    Sharing and Preserving Computational Analyses for Posterity with encapsulator

    Authors: Thomas Pasquier, Matthew K. Lau, Xueyuan Han, Elizabeth Fong, Barbara S. Lerner, Emery Boose, Merce Crosas, Aaron M. Ellison, Margo Seltzer

    Abstract: Open data and open-source software may be part of the solution to science's "reproducibility crisis", but they are insufficient to guarantee reproducibility. Requiring minimal end-user expertise, encapsulator creates a "time capsule" with reproducible code in a self-contained computational environment. encapsulator provides end-users with a fully-featured desktop environment for reproducible resea… ▽ More

    Submitted 6 May, 2018; v1 submitted 15 March, 2018; originally announced March 2018.

    Comments: 11 pages, 6 figures

  16. arXiv:1711.11487  [pdf, ps, other

    eess.SY cs.CR

    FRAPpuccino: Fault-detection through Runtime Analysis of Provenance

    Authors: Xueyuan Han, Thomas Pasquier, Tanvi Ranjan, Mark Goldstein, Margo Seltzer

    Abstract: We present FRAPpuccino (or FRAP), a provenance-based fault detection mechanism for Platform as a Service (PaaS) users, who run many instances of an application on a large cluster of machines. FRAP models, records, and analyzes the behavior of an application and its impact on the system as a directed acyclic provenance graph. It assumes that most instances behave normally and uses their behavior to… ▽ More

    Submitted 30 November, 2017; originally announced November 2017.

    Comments: 7 pages, 2 figures, 1 table

    Journal ref: Han, X., Pasquier, T., Ranjan, T., Goldstein, M. and Seltzer, M., 2017. FRAPpuccino: Fault-detection through Runtime Analysis of Provenance

  17. Practical Whole-System Provenance Capture

    Authors: Thomas Pasquier, Xueyuan Han, Mark Goldstein, Thomas Moyer, David Eyers, Margo Seltzer, Jean Bacon

    Abstract: Data provenance describes how data came to be in its present form. It includes data sources and the transformations that have been applied to them. Data provenance has many uses, from forensics and security to aiding the reproducibility of scientific experiments. We present CamFlow, a whole-system provenance capture mechanism that integrates easily into a PaaS offering. While there have been sever… ▽ More

    Submitted 14 November, 2017; originally announced November 2017.

    Comments: 15 pages, 7 figures

    Journal ref: SoCC '17 Proceedings of the 2017 Symposium on Cloud Computing

  18. CamFlow: Managed Data-sharing for Cloud Services

    Authors: Thomas F. J. -M. Pasquier, Jatinder Singh, David Eyers, Jean Bacon

    Abstract: A model of cloud services is emerging whereby a few trusted providers manage the underlying hardware and communications whereas many companies build on this infrastructure to offer higher level, cloud-hosted PaaS services and/or SaaS applications. From the start, strong isolation between cloud tenants was seen to be of paramount importance, provided first by virtual machines (VM) and later by cont… ▽ More

    Submitted 21 December, 2015; v1 submitted 14 June, 2015; originally announced June 2015.

    Comments: 14 pages, 8 figures

    ACM Class: D.4.6