publication . Preprint . Conference object . 2017

FRAPpuccino: Fault-detection through Runtime Analysis of Provenance

Pasquier, Thomas; Han, Xueyuan Michael; Ranjan, Tanvi; Goldstein, Mark; Seltzer, Margo I.;
Open Access English
  • Published: 30 Nov 2017
  • Country: United States
Abstract
Engineering and Applied Sciences
Subjects
free text keywords: Computer Science - Systems and Control, Computer Science - Cryptography and Security
42 references, page 1 of 3

[1] Apache flume. https://flume.apache.org.

[7] BATES, A. M., TIAN, D., BUTLER, K. R., AND MOYER, T. Trustworthy whole-system provenance for the linux kernel. In Usenix Security (2015), pp. 319-334.

[8] BIGI, B. Using kullback-leibler distance for text categorization. In European Conference on Information Retrieval (2003), Springer, pp. 305-319. [OpenAIRE]

[9] BRAUN, U., SHINNAR, A., AND SELTZER, M. I. Securing provenance. In HotSec (2008). [OpenAIRE]

[10] CHEN, A., WU, Y., HAEBERLEN, A., ZHOU, W., AND LOO, B. T. Differential provenance: Better network diagnostics with reference events. In Proceedings of the 14th ACM Workshop on Hot Topics in Networks (2015), ACM, p. 25.

[11] CHEN, Y.-Y. M., ACCARDI, A., KICIMAN, E., PATTERSON, D. A., FOX, A., AND BREWER, E. A. Path-based failure and evolution management.

[12] DAGAN, I., LEE, L., AND PEREIRA, F. C. Similarity-based models of word cooccurrence probabilities. Machine learning 34, 1-3 (1999), 43-69.

[13] EDWARDS, A., JAEGER, T., AND ZHANG, X. Runtime verification of authorization hook placement for the linux security modules framework. In Proceedings of the 9th ACM Conference on Computer and Communications Security (2002), ACM, pp. 225- 234.

[14] FENG, H. H., GIFFIN, J. T., HUANG, Y., JHA, S., LEE, W., AND MILLER, B. P. Formalizing sensitivity in static analysis for intrusion detection. In Security and Privacy, 2004. Proceedings. 2004 IEEE Symposium on (2004), IEEE, pp. 194-208.

[15] FENG, H. H., KOLESNIKOV, O. M., FOGLA, P., LEE, W., AND GONG, W. Anomaly detection using call stack information. In Security and Privacy, 2003. Proceedings. 2003 Symposium on (2003), IEEE, pp. 62-75.

[16] FORREST, S., HOFMEYR, S. A., SOMAYAJI, A., AND LONGSTAFF, T. A. A sense of self for unix processes. In Security and Privacy, 1996. Proceedings., 1996 IEEE Symposium on (1996), IEEE, pp. 120-128.

[17] GANAPATHY, V., JAEGER, T., AND JHA, S. Automatic placement of authorization hooks in the linux security modules framework. In Proceedings of the 12th ACM conference on Computer and communications security (2005), ACM, pp. 330-339.

[18] GAZIEV, A. How ruby 2.2 can cause an out-of-memory server crash, 2015. https://evilmartians.com/chronicles/ruby-2_2-oom.

[19] GREENE, T. Largest ddos attack ever delivered by botnet of hijacked iot devices, 2016. http://www.networkworld.com/article/3123672/security/largest-ddos

[20] HAN, X. michael-hahn/frap: v1.1.1, 2017. DOI:10.5281/zenodo.571444, https://github.com/michael-hahn/frap .

42 references, page 1 of 3
Abstract
Engineering and Applied Sciences
Subjects
free text keywords: Computer Science - Systems and Control, Computer Science - Cryptography and Security
42 references, page 1 of 3

[1] Apache flume. https://flume.apache.org.

[7] BATES, A. M., TIAN, D., BUTLER, K. R., AND MOYER, T. Trustworthy whole-system provenance for the linux kernel. In Usenix Security (2015), pp. 319-334.

[8] BIGI, B. Using kullback-leibler distance for text categorization. In European Conference on Information Retrieval (2003), Springer, pp. 305-319. [OpenAIRE]

[9] BRAUN, U., SHINNAR, A., AND SELTZER, M. I. Securing provenance. In HotSec (2008). [OpenAIRE]

[10] CHEN, A., WU, Y., HAEBERLEN, A., ZHOU, W., AND LOO, B. T. Differential provenance: Better network diagnostics with reference events. In Proceedings of the 14th ACM Workshop on Hot Topics in Networks (2015), ACM, p. 25.

[11] CHEN, Y.-Y. M., ACCARDI, A., KICIMAN, E., PATTERSON, D. A., FOX, A., AND BREWER, E. A. Path-based failure and evolution management.

[12] DAGAN, I., LEE, L., AND PEREIRA, F. C. Similarity-based models of word cooccurrence probabilities. Machine learning 34, 1-3 (1999), 43-69.

[13] EDWARDS, A., JAEGER, T., AND ZHANG, X. Runtime verification of authorization hook placement for the linux security modules framework. In Proceedings of the 9th ACM Conference on Computer and Communications Security (2002), ACM, pp. 225- 234.

[14] FENG, H. H., GIFFIN, J. T., HUANG, Y., JHA, S., LEE, W., AND MILLER, B. P. Formalizing sensitivity in static analysis for intrusion detection. In Security and Privacy, 2004. Proceedings. 2004 IEEE Symposium on (2004), IEEE, pp. 194-208.

[15] FENG, H. H., KOLESNIKOV, O. M., FOGLA, P., LEE, W., AND GONG, W. Anomaly detection using call stack information. In Security and Privacy, 2003. Proceedings. 2003 Symposium on (2003), IEEE, pp. 62-75.

[16] FORREST, S., HOFMEYR, S. A., SOMAYAJI, A., AND LONGSTAFF, T. A. A sense of self for unix processes. In Security and Privacy, 1996. Proceedings., 1996 IEEE Symposium on (1996), IEEE, pp. 120-128.

[17] GANAPATHY, V., JAEGER, T., AND JHA, S. Automatic placement of authorization hooks in the linux security modules framework. In Proceedings of the 12th ACM conference on Computer and communications security (2005), ACM, pp. 330-339.

[18] GAZIEV, A. How ruby 2.2 can cause an out-of-memory server crash, 2015. https://evilmartians.com/chronicles/ruby-2_2-oom.

[19] GREENE, T. Largest ddos attack ever delivered by botnet of hijacked iot devices, 2016. http://www.networkworld.com/article/3123672/security/largest-ddos

[20] HAN, X. michael-hahn/frap: v1.1.1, 2017. DOI:10.5281/zenodo.571444, https://github.com/michael-hahn/frap .

42 references, page 1 of 3
Powered by OpenAIRE Open Research Graph
Any information missing or wrong?Report an Issue
publication . Preprint . Conference object . 2017

FRAPpuccino: Fault-detection through Runtime Analysis of Provenance

Pasquier, Thomas; Han, Xueyuan Michael; Ranjan, Tanvi; Goldstein, Mark; Seltzer, Margo I.;