Skip to main content

Showing 1–4 of 4 results for author: Mickens, J

Searching in archive cs. Search in all archives.
.
  1. arXiv:2008.11533  [pdf, other

    cs.CR cs.LG

    SIGL: Securing Software Installations Through Deep Graph Learning

    Authors: Xueyuan Han, Xiao Yu, Thomas Pasquier, Ding Li, Junghwan Rhee, James Mickens, Margo Seltzer, Haifeng Chen

    Abstract: Many users implicitly assume that software can only be exploited after it is installed. However, recent supply-chain attacks demonstrate that application integrity must be ensured during installation itself. We introduce SIGL, a new tool for detecting malicious behavior during software installation. SIGL collects traces of system call activity, building a data provenance graph that it analyzes usi… ▽ More

    Submitted 22 June, 2021; v1 submitted 26 August, 2020; originally announced August 2020.

    Comments: 18 pages, to appear in the 30th USENIX Security Symposium (USENIX Security '21)

  2. Xanthus: Push-button Orchestration of Host Provenance Data Collection

    Authors: Xueyuan Han, James Mickens, Ashish Gehani, Margo Seltzer, Thomas Pasquier

    Abstract: Host-based anomaly detectors generate alarms by inspecting audit logs for suspicious behavior. Unfortunately, evaluating these anomaly detectors is hard. There are few high-quality, publicly-available audit logs, and there are no pre-existing frameworks that enable push-button creation of realistic system traces. To make trace generation easier, we created Xanthus, an automated tool that orchestra… ▽ More

    Submitted 10 May, 2020; originally announced May 2020.

    Comments: 6 pages, 1 figure, 7 listings, 1 table, workshop

  3. UNICORN: Runtime Provenance-Based Detector for Advanced Persistent Threats

    Authors: Xueyuan Han, Thomas Pasquier, Adam Bates, James Mickens, Margo Seltzer

    Abstract: Advanced Persistent Threats (APTs) are difficult to detect due to their "low-and-slow" attack patterns and frequent use of zero-day exploits. We present UNICORN, an anomaly-based APT detector that effectively leverages data provenance analysis. From modeling to detection, UNICORN tailors its design specifically for the unique characteristics of APTs. Through extensive yet time-efficient graph anal… ▽ More

    Submitted 14 January, 2020; v1 submitted 6 January, 2020; originally announced January 2020.

    Comments: 19 pages

  4. arXiv:1810.11865  [pdf, other

    cs.PL

    McFly: Time-Travel Debugging for the Web

    Authors: John Vilk, Emery D. Berger, James Mickens, Mark Marron

    Abstract: Time-traveling debuggers offer the promise of simplifying debugging by letting developers freely step forwards and backwards through a program's execution. However, web applications present multiple challenges that make time-travel debugging especially difficult. A time-traveling debugger for web applications must accurately reproduce all network interactions, asynchronous events, and visual state… ▽ More

    Submitted 28 October, 2018; originally announced October 2018.