Nodoze: Combatting threat alert fatigue with automated provenance triage WU Hassan, S Guo, D Li, Z Chen, K Jee, Z Li, A Bates network and distributed systems security symposium, 2019 | 330 | 2019 |
libdft: Practical dynamic data flow tracking for commodity systems VP Kemerlis, G Portokalidis, K Jee, AD Keromytis Proceedings of the 8th ACM SIGPLAN/SIGOPS conference on Virtual Execution …, 2012 | 325 | 2012 |
You Are What You Do: Hunting Stealthy Malware via Data Provenance Analysis. Q Wang, WU Hassan, D Li, K Jee, X Yu, K Zou, J Rhee, Z Chen, W Cheng, ... NDSS, 2020 | 212 | 2020 |
Towards a Timely Causality Analysis for Enterprise Security. Y Liu, M Zhang, D Li, K Jee, Z Li, Z Wu, J Rhee, P Mittal NDSS, 2018 | 208 | 2018 |
High fidelity data reduction for big data security dependency analyses Z Xu, Z Wu, Z Li, K Jee, J Rhee, X Xiao, F Xu, H Wang, G Jiang Proceedings of the 2016 ACM SIGSAC conference on computer and communications …, 2016 | 194 | 2016 |
{SAQL}: A stream-based query system for {Real-Time} abnormal system behavior detection P Gao, X Xiao, D Li, Z Li, K Jee, Z Wu, CH Kim, SR Kulkarni, P Mittal 27th USENIX Security Symposium (USENIX Security 18), 639-656, 2018 | 115 | 2018 |
Nodemerge: Template based efficient data reduction for big-data causality analysis Y Tang, D Li, Z Li, M Zhang, K Jee, X Xiao, Z Wu, J Rhee, F Xu, Q Li Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018 | 102 | 2018 |
ShadowReplica: efficient parallelization of dynamic data flow tracking K Jee, VP Kemerlis, AD Keromytis, G Portokalidis Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013 | 96 | 2013 |
{AIQL}: Enabling efficient attack investigation from system monitoring data P Gao, X Xiao, Z Li, F Xu, SR Kulkarni, P Mittal 2018 USENIX Annual Technical Conference (USENIX ATC 18), 113-126, 2018 | 89 | 2018 |
A General Approach for Efficiently Accelerating Software-based Dynamic Data Flow Tracking on Commodity Hardware. K Jee, G Portokalidis, VP Kemerlis, S Ghosh, DI August, AD Keromytis NDSS, 2012 | 84 | 2012 |
{Back-Propagating} system dependency impact for attack investigation P Fang, P Gao, C Liu, E Ayday, K Jee, T Wang, YF Ye, Z Liu, X Xiao 31st USENIX Security Symposium (USENIX Security 22), 2461-2478, 2022 | 48 | 2022 |
{SEAL}: Storage-efficient causality analysis on enterprise logs with query-friendly compression P Fei, Z Li, Z Wang, X Yu, D Li, K Jee 30th USENIX Security Symposium (USENIX Security 21), 2987-3004, 2021 | 43 | 2021 |
This is why we can’t cache nice things: Lightning-fast threat hunting using suspicion-based hierarchical storage WU Hassan, D Li, K Jee, X Yu, K Zou, D Wang, Z Chen, Z Li, J Rhee, ... Proceedings of the 36th Annual Computer Security Applications Conference …, 2020 | 30 | 2020 |
Template based data reduction for security related information flow data D Li, K Jee, LI Zhichun, M Zhang, Z Wu US Patent 10,733,149, 2020 | 29 | 2020 |
IntFlow: improving the accuracy of arithmetic error detection using information flow tracking M Pomonis, T Petsios, K Jee, M Polychronakis, AD Keromytis Proceedings of the 30th Annual Computer Security Applications Conference …, 2014 | 26 | 2014 |
Countering Malicious Processes with Process-DNS Association. S Sivakorn, K Jee, Y Sun, L Korts-Pärn, Z Li, C Lumezanu, Z Wu, LA Tang, ... NDSS, 2019 | 20 | 2019 |
Host behavior and network analytics based automotive secure gateway J Rhee, H Li, HAO Shuai, CH Kim, Z Wu, LI Zhichun, K Jee, L Korts-Parn US Patent 10,931,635, 2021 | 18 | 2021 |
Evolving advanced persistent threat detection using provenance graph and metric learning G Ayoade, KA Akbar, P Sahoo, Y Gao, A Agarwal, K Jee, L Khan, ... 2020 IEEE Conference on Communications and Network Security (CNS), 1-9, 2020 | 18 | 2020 |
Detecting malware injection with program-dns behavior Y Sun, K Jee, S Sivakorn, Z Li, C Lumezanu, L Korts-Parn, Z Wu, J Rhee, ... 2020 IEEE European Symposium on Security and Privacy (EuroS&P), 552-568, 2020 | 15 | 2020 |
Intrusion detection using efficient system dependency analysis Z Wu, LI Zhichun, J Rhee, F Xu, G Jiang, K Jee, X Xiao, Z Xu US Patent App. 15/416,462, 2017 | 15 | 2017 |