Skip to main content

Showing 1–1 of 1 results for author: Cable, P

Searching in archive cs. Search in all archives.
.
  1. arXiv:1609.00266  [pdf, other

    cs.CR

    Retrofitting Applications with Provenance-Based Security Monitoring

    Authors: Adam Bates, Kevin Butler, Alin Dobra, Brad Reaves, Patrick Cable, Thomas Moyer, Nabil Schear

    Abstract: Data provenance is a valuable tool for detecting and preventing cyber attack, providing insight into the nature of suspicious events. For example, an administrator can use provenance to identify the perpetrator of a data leak, track an attacker's actions following an intrusion, or even control the flow of outbound data within an organization. Unfortunately, providing relevant data provenance for c… ▽ More

    Submitted 1 September, 2016; originally announced September 2016.