no code implementations • 10 Nov 2022 • Xinyu Yang, Haoyuan Liu, Ziyu Wang, Peng Gao
System auditing has emerged as a key approach for monitoring system call events and investigating sophisticated attacks.
no code implementations • 17 Jan 2021 • Peng Gao, Fei Shao, Xiaoyuan Liu, Xusheng Xiao, Haoyuan Liu, Zheng Qin, Fengyuan Xu, Prateek Mittal, Sanjeev R. Kulkarni, Dawn Song
Log-based cyber threat hunting has emerged as an important solution to counter sophisticated cyber attacks.