Thomas Pasquier
Thomas Pasquier
Home
Experience
Joining my lab
Publications
Teaching
Service
Students
Contact
Light
Dark
Automatic
1
Runtime Analysis of Whole-System Provenance
Identifying the root cause and impact of a system intrusion remains a foundational challenge in computer security. Digital provenance …
T Pasquier
,
X Han
,
T Moyer
,
A Bates
,
O Hermant
,
D Eyers
,
J Bacon
,
M Seltzer
PDF
Cite
Code
DOI
Provenance-based Intrusion Detection: Opportunities and Challenges
Intrusion detection is an arms race; attackers evade intrusion detection systems by developing new attack vectors to sidestep known …
X Han
,
T Pasquier
,
M Seltzer
PDF
Cite
Practical Whole-System Provenance Capture
Data provenance describes how data came to be in its present form. It includes data sources and the transformations that have been …
T Pasquier
,
X Han
,
M Goldstein
,
T Moyer
,
D Eyers
,
M Seltzer
,
J Bacon
PDF
Cite
Code
DOI
FRAPpuccino: Fault-detection through Runtime Analysis of Provenance
We present FRAPpuccino (or FRAP), a provenance-based fault detection mechanism for Platform as a Service (PaaS) users, who run many …
X Han
,
T Pasquier
,
T Ranjan
,
M Goldstein
,
M Seltzer
PDF
Cite
PHP2Uni: Building Unikernels using Scripting Language Transpilation
Unikernels are a rapidly emerging technology in the world of cloud computing. Unikernels build on research on library operating systems …
T Pasquier
,
D Eyers
,
J Bacon
PDF
Cite
DOI
Big Ideas paper: Policy-driven middleware for a legally-compliant Internet of Things
Internet of Things (IoT) applications, systems and services are subject to law. We argue that for the IoT to develop lawfully, there …
J Singh
,
T Pasquier
,
J Bacon
,
J Powles
,
R Diaconu
,
D Eyers
PDF
Cite
DOI
Data-Centric Access Control for Cloud Computing
The usual approach to security for cloud-hosted applications is strong separation. However, it is often the case that the same data is …
T Pasquier
,
J Bacon
,
J Singh
,
D Eyers
PDF
Cite
DOI
Information Flow Audit for Transparency and Compliance in the Handling of Personal Data
The adoption of cloud computing is increasing and its use is becoming widespread in many sectors. As the proportion of services …
T Pasquier
,
D Eyers
PDF
Cite
DOI
Information Flow Audit for PaaS clouds
With the rapid increase in uptake of cloud services, issues of data management are becoming increasingly prominent. There is a clear, …
T Pasquier
,
J Singh
,
J Bacon
,
D Eyers
PDF
Cite
DOI
Clouds of Things Need Information Flow Control with Hardware Roots of Trust
There is a clear, outstanding need for new security mechanisms that allow data to be managed and controlled within the cloud-enabled …
T Pasquier
,
J Singh
,
J Bacon
PDF
Cite
DOI
«
»
Cite
×