libdft: Practical dynamic data flow tracking for commodity systems VP Kemerlis, G Portokalidis, K Jee, AD Keromytis Proceedings of the 8th ACM SIGPLAN/SIGOPS conference on Virtual Execution …, 2012 | 304 | 2012 |
Nodoze: Combatting threat alert fatigue with automated provenance triage WU Hassan, S Guo, D Li, Z Chen, K Jee, Z Li, A Bates network and distributed systems security symposium, 2019 | 204 | 2019 |
Towards a Timely Causality Analysis for Enterprise Security. Y Liu, M Zhang, D Li, K Jee, Z Li, Z Wu, J Rhee, P Mittal NDSS, 2018 | 167 | 2018 |
High fidelity data reduction for big data security dependency analyses Z Xu, Z Wu, Z Li, K Jee, J Rhee, X Xiao, F Xu, H Wang, G Jiang Proceedings of the 2016 ACM SIGSAC conference on computer and communications …, 2016 | 147 | 2016 |
You Are What You Do: Hunting Stealthy Malware via Data Provenance Analysis. Q Wang, WU Hassan, D Li, K Jee, X Yu, K Zou, J Rhee, Z Chen, W Cheng, ... NDSS, 2020 | 125 | 2020 |
{SAQL}: A Stream-based Query System for {Real-Time} Abnormal System Behavior Detection P Gao, X Xiao, D Li, Z Li, K Jee, Z Wu, CH Kim, SR Kulkarni, P Mittal 27th USENIX Security Symposium (USENIX Security 18), 639-656, 2018 | 101 | 2018 |
ShadowReplica: efficient parallelization of dynamic data flow tracking K Jee, VP Kemerlis, AD Keromytis, G Portokalidis Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013 | 91 | 2013 |
A General Approach for Efficiently Accelerating Software-based Dynamic Data Flow Tracking on Commodity Hardware. K Jee, G Portokalidis, VP Kemerlis, S Ghosh, DI August, AD Keromytis NDSS, 2012 | 81 | 2012 |
Nodemerge: Template based efficient data reduction for big-data causality analysis Y Tang, D Li, Z Li, M Zhang, K Jee, X Xiao, Z Wu, J Rhee, F Xu, Q Li Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018 | 77 | 2018 |
{AIQL}: Enabling efficient attack investigation from system monitoring data P Gao, X Xiao, Z Li, F Xu, SR Kulkarni, P Mittal 2018 USENIX Annual Technical Conference (USENIX ATC 18), 113-126, 2018 | 75 | 2018 |
{SEAL}: Storage-efficient causality analysis on enterprise logs with query-friendly compression P Fei, Z Li, Z Wang, X Yu, D Li, K Jee 30th USENIX Security Symposium (USENIX Security 21), 2987-3004, 2021 | 26 | 2021 |
IntFlow: improving the accuracy of arithmetic error detection using information flow tracking M Pomonis, T Petsios, K Jee, M Polychronakis, AD Keromytis Proceedings of the 30th Annual Computer Security Applications Conference …, 2014 | 24 | 2014 |
{Back-Propagating} System Dependency Impact for Attack Investigation P Fang, P Gao, C Liu, E Ayday, K Jee, T Wang, YF Ye, Z Liu, X Xiao 31st USENIX Security Symposium (USENIX Security 22), 2461-2478, 2022 | 19 | 2022 |
Countering Malicious Processes with Process-DNS Association. S Sivakorn, K Jee, Y Sun, L Korts-Pärn, Z Li, C Lumezanu, Z Wu, LA Tang, ... NDSS, 2019 | 16 | 2019 |
This is why we can’t cache nice things: Lightning-fast threat hunting using suspicion-based hierarchical storage WU Hassan, D Li, K Jee, X Yu, K Zou, D Wang, Z Chen, Z Li, J Rhee, ... Annual Computer Security Applications Conference, 165-178, 2020 | 15 | 2020 |
Evolving advanced persistent threat detection using provenance graph and metric learning G Ayoade, KA Akbar, P Sahoo, Y Gao, A Agarwal, K Jee, L Khan, ... 2020 IEEE Conference on Communications and Network Security (CNS), 1-9, 2020 | 14 | 2020 |
Host behavior and network analytics based automotive secure gateway J Rhee, H Li, HAO Shuai, CH Kim, Z Wu, LI Zhichun, K Jee, L Korts-Parn US Patent 10,931,635, 2021 | 11 | 2021 |
Querying streaming system monitoring data for enterprise system anomaly detection P Gao, X Xiao, D Li, K Jee, H Chen, SR Kulkarni, P Mittal 2020 IEEE 36th International Conference on Data Engineering (ICDE), 1774-1777, 2020 | 10 | 2020 |
Intrusion detection using efficient system dependency analysis Z Wu, LI Zhichun, J Rhee, F Xu, G Jiang, K Jee, X Xiao, Z Xu US Patent App. 15/416,462, 2017 | 10 | 2017 |
A query system for efficiently investigating complex attack behaviors for enterprise security P Gao, X Xiao, Z Li, K Jee, F Xu, SR Kulkarni, P Mittal arXiv preprint arXiv:1810.03464, 2018 | 9 | 2018 |