Author image not provided
 Xiaokui Shu

Authors:
Add personal information
  Affiliation history
Bibliometrics: publication history
Average citations per article3.60
Citation Count36
Publication count10
Publication years2012-2017
Available for download5
Average downloads per article327.60
Downloads (cumulative)1,638
Downloads (12 Months)742
Downloads (6 Weeks)59
SEARCH
ROLE
Arrow RightAuthor only


AUTHOR'S COLLEAGUES
See all colleagues of this author




BOOKMARK & SHARE


10 results found Export Results: bibtexendnoteacmrefcsv

Result 1 – 10 of 10
Sort by:

1
October 2017
Bibliometrics:
Citation Count: 0

Anomaly detection has been a long-standing security approach with versatile applications, ranging from securing server programs in critical environments, to detecting insider threats in enterprises, to anti-abuse detection for online social networks. Despite the seemingly diverse application domains, anomaly detection solutions share similar technical challenges, such as how to accurately ...

2 published by ACM
September 2017 ACM Transactions on Privacy and Security (TOPS): Volume 20 Issue 4, October 2017
Publisher: ACM
Bibliometrics:
Citation Count: 1
Downloads (6 Weeks): 30,   Downloads (12 Months): 210,   Downloads (Overall): 210

Full text available: PDFPDF
Intertwined developments between program attacks and defenses witness the evolution of program anomaly detection methods. Emerging categories of program attacks, e.g., non-control data attacks and data-oriented programming, are able to comply with normal trace patterns at local views. This article points out the deficiency of existing program anomaly detection models ...
Keywords: event frequency correlation, machine learning, program analysis, context-sensitive grammar, Intrusion detection, anomaly detection, co-occurrence analysis

3 published by ACM
October 2016 CCS '16: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security
Publisher: ACM
Bibliometrics:
Citation Count: 1
Downloads (6 Weeks): 12,   Downloads (12 Months): 181,   Downloads (Overall): 272

Full text available: PDFPDF
This tutorial will present an overview of program anomaly detection, which analyzes normal program behaviors and discovers aberrant executions caused by attacks, misconfigurations, program bugs, and unusual usage patterns. It was first introduced as an analogy between intrusion detection for programs and the immune mechanism in biology. Advanced models have ...
Keywords: anomaly detection, detection accuracy, program trace, formal language, intrusion detection, program analysis

4
February 2016 AAAI'16: Proceedings of the Thirtieth AAAI Conference on Artificial Intelligence
Publisher: AAAI Press
Bibliometrics:
Citation Count: 0

Internet user behavior models characterize user browsing dynamics or the transitions among web pages. The models help Internet companies improve their services by accurately targeting customers and providing them the information they want. For instance, specific web pages can be customized and prefetched for individuals based on sequences of web ...

5
November 2015 RAID 2015: Proceedings of the 18th International Symposium on Research in Attacks, Intrusions, and Defenses - Volume 9404
Publisher: Springer-Verlag New York, Inc.
Bibliometrics:
Citation Count: 2

Program anomaly detection analyzes normal program behaviors and discovers aberrant executions caused by attacks, misconfigurations, program bugs, and unusual usage patterns. The merit of program anomaly detection is its independence from attack signatures, which enables proactive defense against new and unknown attacks. In this paper, we formalize the general program ...
Keywords: Unified framework, Detection accuracy, Automata theory, Program anomaly detection, Theoretical accuracy limit

6 published by ACM
October 2015 CCS '15: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security
Publisher: ACM
Bibliometrics:
Citation Count: 7
Downloads (6 Weeks): 9,   Downloads (12 Months): 167,   Downloads (Overall): 578

Full text available: PDFPDF
Modern stealthy exploits can achieve attack goals without introducing illegal control flows, e.g., tampering with non-control data and waiting for the modified data to propagate and alter the control flow legally. Existing program anomaly detection systems focusing on legal control flow attestation and short call sequence verification are inadequate to ...
Keywords: event correlation, function call, intrusion detection, long execution path, machine learning, program attack

7 published by ACM
March 2015 CODASPY '15: Proceedings of the 5th ACM Conference on Data and Application Security and Privacy
Publisher: ACM
Bibliometrics:
Citation Count: 3
Downloads (6 Weeks): 8,   Downloads (12 Months): 160,   Downloads (Overall): 499

Full text available: PDFPDF
The exposure of sensitive data in storage and transmission poses a serious threat to organizational and personal security. Data leak detection aims at scanning content (in storage or transmission) for exposed sensitive data. Because of the large content and data volume, such a screening algorithm needs to be scalable for ...
Keywords: mapreduce, scalability, collection intersection, data leak detection

8 published by ACM
March 2015 CODASPY '15: Proceedings of the 5th ACM Conference on Data and Application Security and Privacy
Publisher: ACM
Bibliometrics:
Citation Count: 1
Downloads (6 Weeks): 0,   Downloads (12 Months): 24,   Downloads (Overall): 79

Full text available: PDFPDF
The leak of sensitive data on computer systems poses a serious threat to organizational security. Organizations need to identify the exposure of sensitive data by screening the content in storage and transmission, i.e., to detect sensitive information being stored or transmitted in the clear. However, detecting the exposure of sensitive ...
Keywords: content inspection, parallelism, alignment, dynamic programming, algorithm, data leak detection, sampling

9
March 2015 Computers and Security: Volume 49 Issue C, March 2015
Publisher: Elsevier Advanced Technology Publications
Bibliometrics:
Citation Count: 7

As mobile computing becomes an integral part of the modern user experience, malicious applications have infiltrated open marketplaces for mobile platforms. Malware apps stealthily launch operations to retrieve sensitive user or device data or abuse system resources. We describe a highly accurate classification approach for detecting malicious Android apps. Our ...
Keywords: Android malware, Static program analysis, User-trigger dependence, Malware detection, User-intention

10
February 2012 Computers and Security: Volume 31 Issue 1, February, 2012
Publisher: Elsevier Advanced Technology Publications
Bibliometrics:
Citation Count: 7

Biometric systems including keystroke-dynamics based authentication have been well studied in the literature. The attack model in biometrics typically considers impersonation attempts launched by human imposters. However, this attack model is not adequate, as advanced attackers may utilize programs to forge data. In this paper, we consider the effects of ...
Keywords: Authentication, Bot, Forgery, Keystroke dynamics, Attack, Classification, Malware detection



The ACM Digital Library is published by the Association for Computing Machinery. Copyright © 2018 ACM, Inc.
Terms of Usage   Privacy Policy   Code of Ethics   Contact Us