Birhanu Eshete
Publications
Mentoring
Teaching
Service
Contact
V.N. Venkatakrishnan
Latest
Poirot: Aligning Attack Behavior with Kernel Audit Records for Cyber Threat Hunting
HOLMES: Real-time APT Detection through Correlation of Suspicious Information Flows
ProPatrol: Attack Investigation via Extracted High-Level Tasks
NAVEX: Precise and Scalable Exploit Generation for Dynamic Web Applications
SLEUTH: Real-time Attack Scenario Reconstruction from COTS Audit Data
DYNAMINER: Leveraging Offline Infection Analytics for On-the-Wire Malware Detection
Chainsaw: Chained Automated Workflow-based Exploit Generation
EKHunter: A Counter-Offensive Toolkit for Exploit Kit Infiltration
WebWinnow: Leveraging exploit kit workflows to detect malicious URLs
Cite
×