In this paper, we argue that networks should be able to explain to their operators why they are in a certain state, even if – and particularly if – they have been compromised by an attacker. Such a capability would be useful in forensic investigations, where an operator observes an unexpected state and must decide whether it is benign or an indication that the system has been compromised. Using a very pessimistic threat model in which a malicious adversary can completely compromise an arbitrary subset of the nodes in the network, we argue that we cannot expect to get a complete and correct explanation in all possible cases. However, we also show that, based on recent advances in the systems and the database communities, it seems possible to...
In large-scale networks, many things can go wrong: routers can be misconfigured, programs can be bug...
This paper elaborates on a novel approach at preventing exploits from vulnerabilities which remain u...
In large-scale networks, many things can go wrong: routers can be misconfigured, programs can be bug...
In this paper, we argue that networks should be able to explain to their operators why they are in a...
This paper presents secure network provenance (SNP), a novel technique for tracking down compromised...
This paper introduces secure network provenance (SNP), a novel technique that enables networked syst...
This paper introduces secure network provenance (SNP), a novel technique that enables networked syst...
Security protocols are often found to be flawed after their deployment. We present an approach that ...
Securely operating large-scale networks is a non-trivial task involving interactions between various...
Security protocols are often found to be flawed after their deployment. We present an approach that ...
Anomalies and faults are inevitable in computer networks, today more than ever before. This is due t...
Traditionally, the focus of security property ``confidentiality'' is on users' data (or application-...
In this paper we will take an unusual approach to system security. Instead of merely saying that ...
A new model for intrusion and its propagation through various attack schemes in networks is consider...
In order to perform a successful attack on a network, an intruder must know various penetration tech...
In large-scale networks, many things can go wrong: routers can be misconfigured, programs can be bug...
This paper elaborates on a novel approach at preventing exploits from vulnerabilities which remain u...
In large-scale networks, many things can go wrong: routers can be misconfigured, programs can be bug...
In this paper, we argue that networks should be able to explain to their operators why they are in a...
This paper presents secure network provenance (SNP), a novel technique for tracking down compromised...
This paper introduces secure network provenance (SNP), a novel technique that enables networked syst...
This paper introduces secure network provenance (SNP), a novel technique that enables networked syst...
Security protocols are often found to be flawed after their deployment. We present an approach that ...
Securely operating large-scale networks is a non-trivial task involving interactions between various...
Security protocols are often found to be flawed after their deployment. We present an approach that ...
Anomalies and faults are inevitable in computer networks, today more than ever before. This is due t...
Traditionally, the focus of security property ``confidentiality'' is on users' data (or application-...
In this paper we will take an unusual approach to system security. Instead of merely saying that ...
A new model for intrusion and its propagation through various attack schemes in networks is consider...
In order to perform a successful attack on a network, an intruder must know various penetration tech...
In large-scale networks, many things can go wrong: routers can be misconfigured, programs can be bug...
This paper elaborates on a novel approach at preventing exploits from vulnerabilities which remain u...
In large-scale networks, many things can go wrong: routers can be misconfigured, programs can be bug...