Search Results - "Gehani, Ashish"

Refine Results
  1. 1

    IOSPReD: I/O Specialized Packaging of Reduced Datasets and Data-Intensive Applications for Efficient Reproducibility by Niddodi, Chaitra, Gehani, Ashish, Malik, Tanu, Mohan, Sibin, Rilee, Michael Lee

    Published in IEEE access (2023)
    “…The data generated by large scale scientific systems such as NASA's Earth Observing System Data and Information System is expected to increase substantially…”
    Get full text
    Journal Article
  2. 2

    Trimmer: Application Specialization for Code Debloating by Sharif, Hashim, Abubakar, Muhammad, Gehani, Ashish, Zaffar, Fareed

    “…With the proliferation of new hardware architectures and ever-evolving user requirements, the software stack is becoming increasingly bloated. In practice,…”
    Get full text
    Conference Proceeding
  3. 3

    autoMPI: Automated Multiple Perspective Attack Investigation With Semantics Aware Execution Partitioning by Alhanahnah, Mohannad, Ma, Shiqing, Gehani, Ashish, Ciocarlie, Gabriela F., Yegneswaran, Vinod, Jha, Somesh, Zhang, Xiangyu

    Published in IEEE transactions on software engineering (01-04-2023)
    “…Multiple Perspective attack Investigation ( MPI ) is a technique to partition application dependencies based on high-level semantics. It facilitates provenance…”
    Get full text
    Journal Article
  4. 4

    TRACE: Enterprise-Wide Provenance Tracking for Real-Time APT Detection by Irshad, Hassaan, Ciocarlie, Gabriela, Gehani, Ashish, Yegneswaran, Vinod, Lee, Kyu Hyung, Patel, Jignesh, Jha, Somesh, Kwon, Yonghwi, Xu, Dongyan, Zhang, Xiangyu

    “…We present TRACE, a comprehensive provenance tracking system for scalable, real-time, enterprise-wide APT detection. TRACE uses static analysis to identify…”
    Get full text
    Journal Article
  5. 5

    Trimmer: An Automated System for Configuration-Based Software Debloating by Ahmad, Aatira Anum, Noor, Abdul Rafae, Sharif, Hashim, Hameed, Usama, Asif, Shoaib, Anwar, Mubashir, Gehani, Ashish, Zaffar, Fareed, Siddiqui, Junaid Haroon

    Published in IEEE transactions on software engineering (01-09-2022)
    “…Software bloat has negative implications for security, reliability, and performance. To counter bloat, we propose Trimmer , a static analysis-based system for…”
    Get full text
    Journal Article
  6. 6

    Provenance-based Workflow Diagnostics Using Program Specification by Nakamura, Yuta, Malik, Tanu, Kanj, Iyad, Gehani, Ashish

    “…Workflow management systems (WMS) help automate and coordinate scientific modules and monitor their execution. WMSes are also used to repeat a workflow…”
    Get full text
    Conference Proceeding
  7. 7

    Analytical models for risk-based intrusion response by Caskurlu, Bugra, Gehani, Ashish, Bilgin, Cemal Cagatay, Subramani, K.

    “…Risk analysis has been used to manage the security of systems for several decades. However, its use has been limited to offline risk computation and manual…”
    Get full text
    Journal Article
  8. 8
  9. 9

    SoK: Software Debloating Landscape and Future Directions by Alhanahnah, Mohannad, Boshmaf, Yazan, Gehani, Ashish

    Published 15-07-2024
    “…Software debloating seeks to mitigate security risks and improve performance by eliminating unnecessary code. In recent years, a plethora of debloating tools…”
    Get full text
    Journal Article
  10. 10

    Data Mining-Based Ethereum Fraud Detection by Jung, Eunjin, Le Tilly, Marion, Gehani, Ashish, Ge, Yunjie

    “…The popularity of blockchain-based currencies, such as Bitcoin and Ethereum, has grown among enthusiasts since 2009. Relying on the anonymity provided by the…”
    Get full text
    Conference Proceeding
  11. 11

    Kondo: Efficient Provenance-Driven Data Debloating by Modi, Aniket, Tikmany, Rohan, Malik, Tanu, Komondoor, Raghavan, Gehani, Ashish, D'Souza, Deepak

    “…Isolation increases upfront costs of provisioning containers. This is due to unnecessary software and data in container images. While several static and…”
    Get full text
    Conference Proceeding
  12. 12

    Access-Based Carving of Data for Efficient Reproducibility of Containers by Tikmany, Rohan, Modi, Aniket, Atiq, Raffay, Reyad, Moaz, Gehani, Ashish, Malik, Tanu

    “…Scientific applications often depend on data produced from computational models. Model-generated data can be prohibitively large. Current mechanisms for…”
    Get full text
    Conference Proceeding
  13. 13

    ICEMAN: A System for Efficient, Robust and Secure Situational Awareness at the Network Edge by Wood, Samuel, Mathewson, James, Joy, Joshua, Stehr, Mark-Oliver, Minyoung Kim, Gehani, Ashish, Gerla, Mario, Sadjadpour, Hamid, Garcia-Luna-Aceves, J. J.

    “…Situational awareness applications in disaster response and tactical scenarios require efficient communication without a managed infrastructure. In principle,…”
    Get full text
    Conference Proceeding
  14. 14

    BLADE: Towards Scalable Source Code Debloating by Ali, Muaz, Habib, Rumaisa, Gehani, Ashish, Rahaman, Sazzadur, Uzmi, Zartash

    “…Existing source code debloaters fall short due to low scalability and high runtime overhead when applied in dynamic cloud settings, where instances are spun up…”
    Get full text
    Conference Proceeding
  15. 15

    Optimized Rollback and Re-computation by Lakhani, H., Tahir, R., Aqil, A., Zaffar, F., Tariq, D., Gehani, A.

    “…Large data processing tasks can be effected using workflow management systems. When either the input data or the programs in the pipeline are modified, the…”
    Get full text
    Conference Proceeding
  16. 16

    Bonsai: Balanced Lineage Authentication by Gehani, A., Lindqvist, U.

    “…The provenance of a piece of data is of utility to a wide range of applications. Its availability can be drastically increased by automatically collecting…”
    Get full text
    Conference Proceeding
  17. 17

    PACED: Provenance-based Automated Container Escape Detection by Abbas, Mashal, Khan, Shahpar, Monum, Abdul, Zaffar, Fareed, Tahir, Rashid, Eyers, David, Irshad, Hassaan, Gehani, Ashish, Yegneswaran, Vinod, Pasquier, Thomas

    “…The security of container-based microservices relies heavily on the isolation of operating system resources that is provided by namespaces. However,…”
    Get full text
    Conference Proceeding
  18. 18

    CHEX: Multiversion Replay with Ordered Checkpoints by Manne, Naga Nithin, Satpati, Shilvi, Malik, Tanu, Bagchi, Amitabha, Gehani, Ashish, Chaudhary, Amitabh

    Published 16-02-2022
    “…In scientific computing and data science disciplines, it is often necessary to share application workflows and repeat results. Current tools containerize…”
    Get full text
    Journal Article
  19. 19

    Fine-grained tracking of Grid infections by Gehani, A, Baig, B, Mahmood, S, Tariq, D, Zaffar, F

    “…Previous distributed anomaly detection efforts have operated on summary statistics gathered from each node. This has the advantage that the audit trail is…”
    Get full text
    Conference Proceeding
  20. 20

    Xanthus: Push-button Orchestration of Host Provenance Data Collection by Han, Xueyuan, Mickens, James, Gehani, Ashish, Seltzer, Margo, Pasquier, Thomas

    Published 10-05-2020
    “…Host-based anomaly detectors generate alarms by inspecting audit logs for suspicious behavior. Unfortunately, evaluating these anomaly detectors is hard. There…”
    Get full text
    Journal Article