Skip to main content

Showing 1–8 of 8 results for author: Moyer, T

Searching in archive cs. Search in all archives.
.
  1. arXiv:2203.02744  [pdf, other

    cs.CR cs.LG

    Flurry: a Fast Framework for Reproducible Multi-layered Provenance Graph Representation Learning

    Authors: Maya Kapoor, Joshua Melton, Michael Ridenhour, Mahalavanya Sriram, Thomas Moyer, Siddharth Krishnan

    Abstract: Complex heterogeneous dynamic networks like knowledge graphs are powerful constructs that can be used in modeling data provenance from computer systems. From a security perspective, these attributed graphs enable causality analysis and tracing for analyzing a myriad of cyberattacks. However, there is a paucity in systematic development of pipelines that transform system executions and provenance i… ▽ More

    Submitted 5 March, 2022; originally announced March 2022.

    Comments: 10 pages, 5 figures

  2. arXiv:1911.06304  [pdf, other

    cs.CR

    Detecting Safety and Security Faults in PLC Systems with Data Provenance

    Authors: Abdullah Al Farooq, Jessica Marquard, Kripa George, Thomas Moyer

    Abstract: Programmable Logic Controllers are an integral component for managing many different industrial processes (e.g., smart building management, power generation, water and wastewater management, and traffic control systems), and manufacturing and control industries (e.g., oil and natural gas, chemical, pharmaceutical, pulp and paper, food and beverage, automotive, and aerospace). Despite being used wi… ▽ More

    Submitted 14 November, 2019; originally announced November 2019.

    Journal ref: 2019 IEEE International Symposium on Technologies for Homeland Security

  3. arXiv:1812.03966  [pdf, other

    cs.CR cs.CY

    IoTC2: A Formal Method Approach for Detecting Conflicts in Large Scale IoT Systems

    Authors: Abdullah Al Farooq, Ehab Al-Shaer, Thomas Moyer, Krishna Kant

    Abstract: Internet of Things (IoT) has become a common paradigm for different domains such as health care, transportation infrastructure, smart home, smart shop**, and e-commerce. With its interoperable functionality, it is now possible to connect all domains of IoT together for providing competent services to the users. Because numerous IoT devices can connect and communicate at the same time, there can… ▽ More

    Submitted 10 December, 2018; originally announced December 2018.

  4. arXiv:1808.06049  [pdf, other

    cs.CR cs.OS

    Runtime Analysis of Whole-System Provenance

    Authors: Thomas Pasquier, Xueyuan Han, Thomas Moyer, Adam Bates, Olivier Hermant, David Eyers, Jean Bacon, Margo Seltzer

    Abstract: Identifying the root cause and impact of a system intrusion remains a foundational challenge in computer security. Digital provenance provides a detailed history of the flow of information within a computing system, connecting suspicious events to their root causes. Although existing provenance-based auditing techniques provide value in forensic analysis, they assume that such analysis takes place… ▽ More

    Submitted 25 August, 2018; v1 submitted 18 August, 2018; originally announced August 2018.

    Comments: 16 pages, 12 figures, 25th ACM Conference on Computer and Communications Security 2018

  5. arXiv:1806.02227  [pdf, other

    cs.DB

    Curator: Provenance Management for Modern Distributed Systems

    Authors: Warren Smith, Thomas Moyer, Charles Munson

    Abstract: Data provenance is a valuable tool for protecting and troubleshooting distributed systems. Careful design of the provenance components reduces the impact on the design, implementation, and operation of the distributed system. In this paper, we present Curator, a provenance management toolkit that can be easily integrated with microservice-based systems and other modern distributed systems. This pa… ▽ More

    Submitted 6 June, 2018; originally announced June 2018.

    Comments: Published at TaPP 2018, 6 pages

  6. Practical Whole-System Provenance Capture

    Authors: Thomas Pasquier, Xueyuan Han, Mark Goldstein, Thomas Moyer, David Eyers, Margo Seltzer, Jean Bacon

    Abstract: Data provenance describes how data came to be in its present form. It includes data sources and the transformations that have been applied to them. Data provenance has many uses, from forensics and security to aiding the reproducibility of scientific experiments. We present CamFlow, a whole-system provenance capture mechanism that integrates easily into a PaaS offering. While there have been sever… ▽ More

    Submitted 14 November, 2017; originally announced November 2017.

    Comments: 15 pages, 7 figures

    Journal ref: SoCC '17 Proceedings of the 2017 Symposium on Cloud Computing

  7. arXiv:1609.00266  [pdf, other

    cs.CR

    Retrofitting Applications with Provenance-Based Security Monitoring

    Authors: Adam Bates, Kevin Butler, Alin Dobra, Brad Reaves, Patrick Cable, Thomas Moyer, Nabil Schear

    Abstract: Data provenance is a valuable tool for detecting and preventing cyber attack, providing insight into the nature of suspicious events. For example, an administrator can use provenance to identify the perpetrator of a data leak, track an attacker's actions following an intrusion, or even control the flow of outbound data within an organization. Unfortunately, providing relevant data provenance for c… ▽ More

    Submitted 1 September, 2016; originally announced September 2016.

  8. arXiv:1608.03780  [pdf, other

    cs.DB cs.CR

    High-throughput Ingest of Provenance Records into Accumulo

    Authors: Thomas Moyer, Vijay Gadepally

    Abstract: Whole-system data provenance provides deep insight into the processing of data on a system, including detecting data integrity attacks. The downside to systems that collect whole-system data provenance is the sheer volume of data that is generated under many heavy workloads. In order to make provenance metadata useful, it must be stored somewhere where it can be queried. This problem becomes even… ▽ More

    Submitted 12 August, 2016; originally announced August 2016.

    Comments: 6 pages, 4 figures, IEEE HPEC 2016