Thomas Pasquier
Thomas Pasquier
Home
Working with me
Experience
Publications
Talks
Projects
Teaching & Service
Contact
Light
Dark
Automatic
Recent & Upcoming Talks
2020
Building a provenance-based intrusion detection system
Provenance is the representation of a system execution as a directed acyclic graph. Those graphs, representing the execution of an …
Dec 8, 2020 7:00 AM
Academy of Mathematics and Systems Science, Chinese Academy of Sciences
Slides
Building a provenance-based intrusion detection system
Provenance is the representation of a system execution as a directed acyclic graph. Those graphs, representing the execution of an …
Nov 26, 2020 11:00 AM
Toshiba (virtually)
Slides
Provenance-based intrusion detection
Provenance is the representation of a system execution as a directed acyclic graph. Those graphs, representing the execution of an …
Nov 12, 2020 10:00 AM
virtually
Slides
To Tune or not To Tune
Thomas Pasquier is currently an Assistant Professor at the University of Bristol (UK). Thomas has been working on how to make systems …
Nov 5, 2020 8:15 PM
Microsoft (virtually)
Slides
Provenance-based Intrusion Detection
Whole-system provenance is the record of flows of information between kernel objects (e.g., files, task, sockets etc.). This …
Jan 15, 2020 3:00 PM
Newcastle University
Slides
2019
Building a provenance-based IDS and the questions we ask ourselves
Provenance is the representation of a system execution as a directed acyclic graph. Whole-system provenance graph, representing the …
Nov 11, 2019 9:45 AM
The Alan Turing Institute, London
Slides
Towards provenance-based intrusion detection
Provenance is the representation of a system execution as a directed acyclic graph. Whole-system provenance graph, representing the …
Jun 6, 2019 10:30 AM
HP Labs, Bristol
Slides
Towards provenance-based intrusion detection
In this talk, provenance-based intrusion detection will be discussed. We are building a full stack solution to perform host-based …
Mar 11, 2019 10:00 AM
Loughborough University, UK
Building a provenance-based intrusion detection system
Provenance is the representation of a system execution as a directed acyclic graph. Whole-system provenance graph, representing the …
Jan 22, 2019 3:00 PM
Royal Holloway, University of London
Slides
2018
Towards a provenance-based intrusion detection system
Provenance is the representation of a system execution as a directed acyclic graph. Whole-system provenance graph, representing the …
Dec 5, 2018 12:30 PM
University of Bristol
Runtime Analysis of Whole-System Provenance
Identifying the root cause and impact of a system intrusion remains a foundational challenge in computer security. Digital provenance …
Oct 18, 2018 11:30 AM
Toronto, Canada
PDF
Provenance-based Intrusion Detection: Opportunities and Challenges
Intrusion detection is an arms race; attackers evade intrusion detection systems by developing new attack vectors to sidestep known …
Jul 11, 2018 12:00 PM
London, UK
PDF
Building a provenance capture mechanism
There is a consensus that understanding data provenance, the origin and history of digital artifacts, is important. Whole-system …
Jun 6, 2018 3:00 PM
Cambridge, United Kingdom
Towards practical whole-system provenance
There is a consensus that understanding data provenance, the origin and history of digital artifacts, is important. Whole-system …
Jan 8, 2018 1:00 PM
Edinburgh, United Kingdom
2017
Practical Whole-System Provenance Capture
Data provenance describes how data came to be in its present form. It includes data sources and the transformations that have been …
Sep 25, 2017 10:20 AM
Santa Clara, California
PDF
Cite
×