Thomas Pasquier
Thomas Pasquier
Home
Experience
Joining my lab
Publications
Talks
Teaching
Service
Students
Contact
Light
Dark
Automatic
1
Secure Namespaced Kernel Audit for Containers
Despite the wide usage of container-based cloud computing, container auditing for security analysis relies mostly on built-in host …
SY Lim
,
B Stelea
,
X Han
,
T Pasquier
PDF
Cite
SIGL: Securing Software Installations Through Deep Graph Learning
Many users implicitly assume that software can only be exploited after it is installed. However, recent supply-chain attacks …
X Han
,
X Yu
,
T Pasquier
,
D Li
,
J Rhee
,
J Mickens
,
M Seltzer
,
C Haifeng
PDF
Cite
Accelerating the Configuration Tuning of Big Data Analytics with Similarity-aware Multitask Bayesian Optimization
One of the key challenges for data analytics deployment is configuration tuning. The existing approaches for configuration tuning are …
A Fekry
,
L Carata
,
T Pasquier
,
A Rice
PDF
Cite
Slides
To Tune or Not to Tune? In Search of Optimal Configurations for Data Analytics
This experimental study presents a number of issues that pose a challenge for practical configuration tuning and its deployment in data …
A Fekry
,
L Carata
,
T Pasquier
,
A Rice
,
A Hopper
PDF
Cite
Xanthus: Push-button Orchestration of Host Provenance Data Collection
Host-based anomaly detectors generate alarms by inspecting audit logs for suspicious behavior. Unfortunately, evaluating these anomaly …
X Han
,
J Mickens
,
A Gehani
,
M Seltzer
,
T Pasquier
PDF
Cite
UNICORN: Runtime Provenance-Based Detector for Advanced Persistent Threats
Advanced Persistent Threats (APTs) are difficult to detect due to their low-and-slow attack patterns and frequent use of zero-day …
X Han
,
T Pasquier
,
A Bates
,
J Mickens
,
M Seltzer
PDF
Cite
Facilitating plausible deniability for cloud providers regarding tenants' activities using trusted execution
A cloud provider that can technically determine tenants’ operations may be compelled to disclose such activities by law …
D O'Keeffe
,
A Vranaki
,
T Pasquier
,
D Eyers
PDF
Cite
Demonstrating the Practicality of Unikernels to Build a Serverless Platform at the Edge
The rise of IoT has led to large volumes of personal data being produced at the network’s edge. Most IoT applications process data in …
C Mistry
,
B Stelea
,
V Kumar
,
T Pasquier
PDF
Cite
Code
DOI
ProvMark: A Provenance Expressiveness Benchmarking System
System level provenance is of widespread interest for applications such as security enforcement and information protection. However, …
S C Chan
,
J Cheney
,
P Bhatotia
,
A Gehani
,
H Irshad
,
T Pasquier
,
L Carata
,
M Seltzer
PDF
Cite
From Here to Provtopia
Valuable, sensitive, and regulated data flow freely through distributed governing the collection, use, and management of such data? We …
T Pasquier
,
D Eyers
,
M Seltzer
PDF
Cite
»
Cite
×