Search Results - "Gehani, Ashish"
-
1
IOSPReD: I/O Specialized Packaging of Reduced Datasets and Data-Intensive Applications for Efficient Reproducibility
Published in IEEE access (2023)“…The data generated by large scale scientific systems such as NASA's Earth Observing System Data and Information System is expected to increase substantially…”
Get full text
Journal Article -
2
Trimmer: Application Specialization for Code Debloating
Published in 2018 33rd IEEE/ACM International Conference on Automated Software Engineering (ASE) (01-09-2018)“…With the proliferation of new hardware architectures and ever-evolving user requirements, the software stack is becoming increasingly bloated. In practice,…”
Get full text
Conference Proceeding -
3
autoMPI: Automated Multiple Perspective Attack Investigation With Semantics Aware Execution Partitioning
Published in IEEE transactions on software engineering (01-04-2023)“…Multiple Perspective attack Investigation ( MPI ) is a technique to partition application dependencies based on high-level semantics. It facilitates provenance…”
Get full text
Journal Article -
4
TRACE: Enterprise-Wide Provenance Tracking for Real-Time APT Detection
Published in IEEE transactions on information forensics and security (2021)“…We present TRACE, a comprehensive provenance tracking system for scalable, real-time, enterprise-wide APT detection. TRACE uses static analysis to identify…”
Get full text
Journal Article -
5
Trimmer: An Automated System for Configuration-Based Software Debloating
Published in IEEE transactions on software engineering (01-09-2022)“…Software bloat has negative implications for security, reliability, and performance. To counter bloat, we propose Trimmer , a static analysis-based system for…”
Get full text
Journal Article -
6
Provenance-based Workflow Diagnostics Using Program Specification
Published in 2022 IEEE 29th International Conference on High Performance Computing, Data, and Analytics (HiPC) (01-12-2022)“…Workflow management systems (WMS) help automate and coordinate scientific modules and monitor their execution. WMSes are also used to repeat a workflow…”
Get full text
Conference Proceeding -
7
Analytical models for risk-based intrusion response
Published in Computer networks (Amsterdam, Netherlands : 1999) (05-07-2013)“…Risk analysis has been used to manage the security of systems for several decades. However, its use has been limited to offline risk computation and manual…”
Get full text
Journal Article -
8
-
9
SoK: Software Debloating Landscape and Future Directions
Published 15-07-2024“…Software debloating seeks to mitigate security risks and improve performance by eliminating unnecessary code. In recent years, a plethora of debloating tools…”
Get full text
Journal Article -
10
Data Mining-Based Ethereum Fraud Detection
Published in 2019 IEEE International Conference on Blockchain (Blockchain) (01-07-2019)“…The popularity of blockchain-based currencies, such as Bitcoin and Ethereum, has grown among enthusiasts since 2009. Relying on the anonymity provided by the…”
Get full text
Conference Proceeding -
11
Kondo: Efficient Provenance-Driven Data Debloating
Published in 2024 IEEE 40th International Conference on Data Engineering (ICDE) (13-05-2024)“…Isolation increases upfront costs of provisioning containers. This is due to unnecessary software and data in container images. While several static and…”
Get full text
Conference Proceeding -
12
Access-Based Carving of Data for Efficient Reproducibility of Containers
Published in 2024 IEEE 24th International Symposium on Cluster, Cloud and Internet Computing (CCGrid) (06-05-2024)“…Scientific applications often depend on data produced from computational models. Model-generated data can be prohibitively large. Current mechanisms for…”
Get full text
Conference Proceeding -
13
ICEMAN: A System for Efficient, Robust and Secure Situational Awareness at the Network Edge
Published in MILCOM 2013 - 2013 IEEE Military Communications Conference (01-11-2013)“…Situational awareness applications in disaster response and tactical scenarios require efficient communication without a managed infrastructure. In principle,…”
Get full text
Conference Proceeding -
14
BLADE: Towards Scalable Source Code Debloating
Published in 2023 IEEE Secure Development Conference (SecDev) (18-10-2023)“…Existing source code debloaters fall short due to low scalability and high runtime overhead when applied in dynamic cloud settings, where instances are spun up…”
Get full text
Conference Proceeding -
15
Optimized Rollback and Re-computation
Published in 2013 46th Hawaii International Conference on System Sciences (01-01-2013)“…Large data processing tasks can be effected using workflow management systems. When either the input data or the programs in the pipeline are modified, the…”
Get full text
Conference Proceeding -
16
Bonsai: Balanced Lineage Authentication
Published in Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007) (01-12-2007)“…The provenance of a piece of data is of utility to a wide range of applications. Its availability can be drastically increased by automatically collecting…”
Get full text
Conference Proceeding -
17
PACED: Provenance-based Automated Container Escape Detection
Published in 2022 IEEE International Conference on Cloud Engineering (IC2E) (01-09-2022)“…The security of container-based microservices relies heavily on the isolation of operating system resources that is provided by namespaces. However,…”
Get full text
Conference Proceeding -
18
CHEX: Multiversion Replay with Ordered Checkpoints
Published 16-02-2022“…In scientific computing and data science disciplines, it is often necessary to share application workflows and repeat results. Current tools containerize…”
Get full text
Journal Article -
19
Fine-grained tracking of Grid infections
Published in 2010 11th IEEE/ACM International Conference on Grid Computing (01-10-2010)“…Previous distributed anomaly detection efforts have operated on summary statistics gathered from each node. This has the advantage that the audit trail is…”
Get full text
Conference Proceeding -
20
Xanthus: Push-button Orchestration of Host Provenance Data Collection
Published 10-05-2020“…Host-based anomaly detectors generate alarms by inspecting audit logs for suspicious behavior. Unfortunately, evaluating these anomaly detectors is hard. There…”
Get full text
Journal Article