Topics · Papers
Intrusion detection
Detecting Structurally Anomalous Logins Within Enterprise NetworksHossein Siadati (New York University), Nasir Memon (New York University)
Practical Attacks Against Graph-based ClusteringYizheng Chen (Georgia Institute of Technology), Yacin Nadji (Georgia Institute of Technology), Athanasios Kountouras (Georgia Institute of Technology), Fabian Monrose (University of North Carolina at Chapel Hill), Roberto Perdisci (University of Georgia), Manos Antonakakis (Georgia Institute of Technology), Nikolaos Vasiloglou (Symantec)
DeepLog: Anomaly Detection and Diagnosis from System Logs through Deep LearningMin Du (University of Utah), Feifei Li (University of Utah), Guineng Zheng (University of Utah), Vivek Srikumar (University of Utah)
Data breaches, phishing, or malware? Understanding the risks of stolen credentialsKurt Thomas (Google), Frank Li (University of California, Berkeley), Ali Zand (Google), Jake Barrett (Google), Juri Ranieri (Google), Luca Invernizzi (Google), Yarik Markov (Google), Oxana Comanescu (Google), Vijay Eranti (Google), Angelika Moscicki (Google), Dan Margolis (Google), Vern Paxson (University of California, Berkeley), Elie Bursztein (Google)
Watch Me, but Don’t Touch Me! Contactless Control Flow Monitoring via Electromagnetic EmanationsYi Han (Rutgers University), Sriharsha Etigowni (Rutgers University), Hua Liu (Rutgers University), Saman Zonouz (Rutgers University), Athina Petropulu (Rutgers University)
RAIN: Refinable Attack Investigation with On-demand Inter-Process Information Flow TrackingYang Ji (Georgia Institute of Technology), Sangho Lee (Georgia Institute of Technology), Evan Downing (Georgia Institute of Technology), Weiren Wang (Georgia Institute of Technology), Mattia Fazzini (Georgia Institute of Technology), Taesoo Kim (Georgia Institute of Technology), Alessandro Orso (Georgia Institute of Technology), Wenke Lee (Georgia Institute of Technology)