libdft: Practical dynamic data flow tracking for commodity systems VP Kemerlis, G Portokalidis, K Jee, AD Keromytis Proceedings of the 8th ACM SIGPLAN/SIGOPS conference on Virtual Execution …, 2012 | 287 | 2012 |
Nodoze: Combatting threat alert fatigue with automated provenance triage WU Hassan, S Guo, D Li, Z Chen, K Jee, Z Li, A Bates network and distributed systems security symposium, 2019 | 161 | 2019 |
Towards a Timely Causality Analysis for Enterprise Security. Y Liu, M Zhang, D Li, K Jee, Z Li, Z Wu, J Rhee, P Mittal NDSS, 2018 | 138 | 2018 |
High fidelity data reduction for big data security dependency analyses Z Xu, Z Wu, Z Li, K Jee, J Rhee, X Xiao, F Xu, H Wang, G Jiang Proceedings of the 2016 ACM SIGSAC conference on computer and communications …, 2016 | 128 | 2016 |
{SAQL}: A stream-based query system for real-time abnormal system behavior detection P Gao, X Xiao, D Li, Z Li, K Jee, Z Wu, CH Kim, SR Kulkarni, P Mittal 27th {USENIX} security symposium ({USENIX} security 18), 639-656, 2018 | 89 | 2018 |
ShadowReplica: efficient parallelization of dynamic data flow tracking K Jee, VP Kemerlis, AD Keromytis, G Portokalidis Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013 | 85 | 2013 |
You Are What You Do: Hunting Stealthy Malware via Data Provenance Analysis. Q Wang, WU Hassan, D Li, K Jee, X Yu, K Zou, J Rhee, Z Chen, W Cheng, ... NDSS, 2020 | 81 | 2020 |
A General Approach for Efficiently Accelerating Software-based Dynamic Data Flow Tracking on Commodity Hardware. K Jee, G Portokalidis, VP Kemerlis, S Ghosh, DI August, AD Keromytis NDSS, 2012 | 79 | 2012 |
{AIQL}: Enabling efficient attack investigation from system monitoring data P Gao, X Xiao, Z Li, F Xu, SR Kulkarni, P Mittal 2018 {USENIX} Annual Technical Conference ({USENIX}{ATC} 18), 113-126, 2018 | 68 | 2018 |
Nodemerge: Template based efficient data reduction for big-data causality analysis Y Tang, D Li, Z Li, M Zhang, K Jee, X Xiao, Z Wu, J Rhee, F Xu, Q Li Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018 | 66 | 2018 |
IntFlow: improving the accuracy of arithmetic error detection using information flow tracking M Pomonis, T Petsios, K Jee, M Polychronakis, AD Keromytis Proceedings of the 30th Annual Computer Security Applications Conference …, 2014 | 23 | 2014 |
SEAL: Storage-efficient Causality Analysis on Enterprise Logs with Query-friendly Compression. P Fei, Z Li, Z Wang, X Yu, D Li, K Jee USENIX Security Symposium, 2987-3004, 2021 | 16 | 2021 |
Template based data reduction for security related information flow data D Li, K Jee, LI Zhichun, M Zhang, Z Wu US Patent 10,733,149, 2020 | 16 | 2020 |
Countering Malicious Processes with Process-DNS Association. S Sivakorn, K Jee, Y Sun, L Korts-Pärn, Z Li, C Lumezanu, Z Wu, LA Tang, ... NDSS, 2019 | 15 | 2019 |
Host behavior and network analytics based automotive secure gateway J Rhee, H Li, HAO Shuai, CH Kim, Z Wu, LI Zhichun, K Jee, L Korts-Parn US Patent 10,931,635, 2021 | 11 | 2021 |
This is why we can’t cache nice things: Lightning-fast threat hunting using suspicion-based hierarchical storage WU Hassan, D Li, K Jee, X Yu, K Zou, D Wang, Z Chen, Z Li, J Rhee, ... Annual Computer Security Applications Conference, 165-178, 2020 | 11 | 2020 |
Evolving advanced persistent threat detection using provenance graph and metric learning G Ayoade, KA Akbar, P Sahoo, Y Gao, A Agarwal, K Jee, L Khan, ... 2020 IEEE Conference on Communications and Network Security (CNS), 1-9, 2020 | 10 | 2020 |
{Back-Propagating} System Dependency Impact for Attack Investigation P Fang, P Gao, C Liu, E Ayday, K Jee, T Wang, YF Ye, Z Liu, X Xiao 31st USENIX Security Symposium (USENIX Security 22), 2461-2478, 2022 | 9 | 2022 |
Querying streaming system monitoring data for enterprise system anomaly detection P Gao, X Xiao, D Li, K Jee, H Chen, SR Kulkarni, P Mittal 2020 IEEE 36th International Conference on Data Engineering (ICDE), 1774-1777, 2020 | 9 | 2020 |
A query system for efficiently investigating complex attack behaviors for enterprise security P Gao, X Xiao, Z Li, K Jee, F Xu, SR Kulkarni, P Mittal arXiv preprint arXiv:1810.03464, 2018 | 9 | 2018 |