Recent & Upcoming Talks

2019

In this talk, provenance-based intrusion detection will be discussed. We are building a full stack solution to perform host-based …

Provenance is the representation of a system execution as a directed acyclic graph. Whole-system provenance graph, representing the …

2018

Provenance is the representation of a system execution as a directed acyclic graph. Whole-system provenance graph, representing the …

Identifying the root cause and impact of a system intrusion remains a foundational challenge in computer security. Digital provenance …

Intrusion detection is an arms race; attackers evade intrusion detection systems by developing new attack vectors to sidestep known …

There is a consensus that understanding data provenance, the origin and history of digital artifacts, is important. Whole-system …

There is a consensus that understanding data provenance, the origin and history of digital artifacts, is important. Whole-system …

2017

Data provenance describes how data came to be in its present form. It includes data sources and the transformations that have been …