Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- ArticleJuly 2018
Kernel-supported cost-effective audit logging for causality tracking
- Shiqing Ma,
- Juan Zhai,
- Yonghwi Kwon,
- Kyu Hyung Lee,
- Xiangyu Zhang,
- Gabriela Ciocarlie,
- Ashish Gehani,
- Vinod Yegneswaran,
- Dongyan Xu,
- Somesh Jha
USENIX ATC '18: Proceedings of the 2018 USENIX Conference on Usenix Annual Technical ConferencePages 241–253The Linux Audit system is widely used as a causality tracking system in real-world deployments for problem diagnosis and forensic analysis. However, it has poor performance. We perform a comprehensive analysis on the Linux Audit system and find that it ...
- research-articleMay 2018
Cross-Layer Retrofitting of UAVs Against Cyber-Physical Attacks
2018 IEEE International Conference on Robotics and Automation (ICRA)Pages 550–557https://doi.org/10.1109/ICRA.2018.8462886As a rapidly growing cyber-physical platform, unmanned aerial vehicles are facing more security threats as their capabilities and applications continue to expand. Adversaries with detailed knowledge about the vehicle could orchestrate sophisticated ...
- research-articleDecember 2017
RevARM: A Platform-Agnostic ARM Binary Rewriter for Security Applications
ACSAC '17: Proceedings of the 33rd Annual Computer Security Applications ConferencePages 412–424https://doi.org/10.1145/3134600.3134627ARM is the leading processor architecture in the emerging mobile and embedded market. Unfortunately, there has been a myriad of security issues on both mobile and embedded systems. While many countermeasures of such security issues have been proposed in ...
- proceedingOctober 2017
CCS '17: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security
Welcome to the 24th ACM Conference on Computer and Communications Security!
Since 1993, CCS has been the ACM's flagship conference for research in all aspects of computing and communications security and privacy. This year's conference attracted a record ...
- ArticleAugust 2017
MPI: multiple perspective attack investigation with semantics aware execution partitioning
Traditional auditing techniques generate large and inaccurate causal graphs. To overcome such limitations, researchers proposed to leverage execution partitioning to improve analysis granularity and hence precision. However, these techniques rely on a ...
- research-articleJuly 2017
CPR: cross platform binary code reuse via platform independent trace program
ISSTA 2017: Proceedings of the 26th ACM SIGSOFT International Symposium on Software Testing and AnalysisPages 158–169https://doi.org/10.1145/3092703.3092707The rapid growth of Internet of Things (IoT) has been created a number of new platforms recently. Unfortunately, such variety of IoT devices causes platform fragmentation which makes software development on such devices challenging. In particular, ...
- research-articleApril 2017
J-Force: Forced Execution on JavaScript
WWW '17: Proceedings of the 26th International Conference on World Wide WebPages 897–906https://doi.org/10.1145/3038912.3052674Web-based malware equipped with stealthy cloaking and obfuscation techniques is becoming more sophisticated nowadays. In this paper, we propose J-FORCE, a crash-free forced JavaScript execution engine to systematically explore possible execution paths ...
- research-articleDecember 2016
HERCULE: attack story reconstruction via community discovery on correlated log graph
- Kexin Pei,
- Zhongshu Gu,
- Brendan Saltaformaggio,
- Shiqing Ma,
- Fei Wang,
- Zhiwei Zhang,
- Luo Si,
- Xiangyu Zhang,
- Dongyan Xu
ACSAC '16: Proceedings of the 32nd Annual Conference on Computer Security ApplicationsPages 583–595https://doi.org/10.1145/2991079.2991122Advanced cyber attacks consist of multiple stages aimed at being stealthy and elusive. Such attack patterns leave their footprints spatio-temporally dispersed across many different logs in victim machines. However, existing log-mining intrusion analysis ...
- research-articleNovember 2016
PerfGuard: binary-centric application performance monitoring in production environments
FSE 2016: Proceedings of the 2016 24th ACM SIGSOFT International Symposium on Foundations of Software EngineeringPages 595–606https://doi.org/10.1145/2950290.2950347Diagnosis of performance problems is an essential part of software development and maintenance. This is in particular a challenging problem to be solved in the production environment where only program binaries are available with limited or zero ...
- research-articleOctober 2016
BASS: Improving I/O Performance for Cloud Block Storage via Byte-Addressable Storage Stack
SoCC '16: Proceedings of the Seventh ACM Symposium on Cloud ComputingPages 169–181https://doi.org/10.1145/2987550.2987557In an Infrastructure-as-a-Service cloud, cloud block storage offers conventional, block-level storage resources via a storage area network. However, compared to local storage, this multilayered cloud storage model imposes considerable I/O overheads due ...
- ArticleAugust 2016
Screen after previous screens: spatial-temporal recreation of android app displays from memory images
Smartphones are increasingly involved in cyber and real world crime investigations. In this paper, we demonstrate a powerful smartphone memory forensics technique, called RetroScope, which recovers multiple previous screens of an Android app - in the ...
- ArticleAugust 2016
Eavesdropping on fine-grained user activities within smartphone apps over encrypted network traffic
- Brendan Saltaformaggio,
- Hongjun Choi,
- Kristen Johnson,
- Yonghwi Kwon,
- Qi Zhang,
- Xiangyu Zhang,
- Dongyan Xu,
- John Qian
Smartphone apps have changed the way we interact with online services, but highly specialized apps come at a cost to privacy. In this paper we will demonstrate that a passive eavesdropper is capable of identifying finegrained user activities within the ...
- research-articleMarch 2016
LDX: Causality Inference by Lightweight Dual Execution
- Yonghwi Kwon,
- Dohyeong Kim,
- William Nick Sumner,
- Kyungtae Kim,
- Brendan Saltaformaggio,
- Xiangyu Zhang,
- Dongyan Xu
ASPLOS '16: Proceedings of the Twenty-First International Conference on Architectural Support for Programming Languages and Operating SystemsPages 503–515https://doi.org/10.1145/2872362.2872395Causality inference, such as dynamic taint anslysis, has many applications (e.g., information leak detection). It determines whether an event e is causally dependent on a preceding event c during execution. We develop a new causality inference engine ...
Also Published in:
ACM SIGPLAN Notices: Volume 51 Issue 4ACM SIGARCH Computer Architecture News: Volume 44 Issue 2 - research-articleDecember 2015
Accurate, Low Cost and Instrumentation-Free Security Audit Logging for Windows
ACSAC '15: Proceedings of the 31st Annual Computer Security Applications ConferencePages 401–410https://doi.org/10.1145/2818000.2818039Audit logging is an important approach to cyber attack investigation. However, traditional audit logging either lacks accuracy or requires expensive and complex binary instrumentation. In this paper, we propose a Windows based audit logging technique ...
- research-articleNovember 2015
vRead: Efficient Data Access for Hadoop in Virtualized Clouds
Middleware '15: Proceedings of the 16th Annual Middleware ConferencePages 125–136https://doi.org/10.1145/2814576.2814735With its unlimited scalability and on-demand access to computation and storage, a virtualized cloud platform is the perfect match for big data systems such as Hadoop. However, virtualization introduces a significant amount of overhead to I/O intensive ...
- research-articleOctober 2015
VCR: App-Agnostic Recovery of Photographic Evidence from Android Device Memory Images
CCS '15: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications SecurityPages 146–157https://doi.org/10.1145/2810103.2813720The ubiquity of modern smartphones means that nearly everyone has easy access to a camera at all times. In the event of a crime, the photographic evidence that these cameras leave in a smartphone's memory becomes vital pieces of digital evidence, and ...
- research-articleOctober 2015
iRiS: Vetting Private API Abuse in iOS Applications
CCS '15: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications SecurityPages 44–56https://doi.org/10.1145/2810103.2813675With the booming sale of iOS devices, the number of iOS applications has increased significantly in recent years. To protect the security of iOS users, Apple requires every iOS application to go through a vetting process called App Review to detect uses ...
- research-articleOctober 2015Best Paper
GUITAR: Piecing Together Android App GUIs from Memory Images
CCS '15: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications SecurityPages 120–132https://doi.org/10.1145/2810103.2813650An Android app's graphical user interface (GUI) displays rich semantic and contextual information about the smartphone's owner and app's execution. Such information provides vital clues to the investigation of crimes in both cyber and physical spaces. ...
- ArticleSeptember 2015
A Practical Approach for Adaptive Data Structure Layout Randomization
AbstractAttackers often corrupt data structures to compromise software systems. As a countermeasure, data structure layout randomization has been proposed. Unfortunately, existing techniques require manual designation of randomize-able data structures ...
- research-articleAugust 2015
vFair: latency-aware fair storage scheduling via per-IO cost-based differentiation
SoCC '15: Proceedings of the Sixth ACM Symposium on Cloud ComputingPages 125–138https://doi.org/10.1145/2806777.2806943In virtualized data centers, multiple VMs are consolidated to access a shared storage system. Effective storage resource management, however, turns out to be challenging, as VM workloads exhibit various IO patterns and diverse loads. To multiplex the ...