Provenance threat modeling

O Hambolu, L Yu, J Oakley, RR Brooks… - 2016 14th Annual …, 2016 - ieeexplore.ieee.org
provenance systems might be exposed to and recommend security solutions to better protect
the provenancemodel for securing provenance metadata using cryptocurrency primitives. …

Threat detection and investigation with system-level provenance graphs: A survey

Z Li, QA Chen, R Yang, Y Chen, W Ruan - Computers & Security, 2021 - Elsevier
… In this section, we first give several threat models (Section 6.1) commonly used in threat
detection research using provenance graphs. Then we give a comparison of the existing …

Data provenance in security and privacy

B Pan, N Stakhanova, S Ray - ACM Computing Surveys, 2023 - dl.acm.org
… We discuss the existing threat provenance studies and the associated mechanisms for tracing
threats, … systems exhibited is assuring security under relaxed threat models, often implicitly …

Threatrace: Detecting and tracing host-based threats in node level through provenance graph learning

S Wang, Z Wang, T Zhou, H Sun, X Yin… - IEEE Transactions …, 2022 - ieeexplore.ieee.org
… We introduce the threat model in §IV. An overall description of THREATRACE is presented
in §V. We introduce the experiments in §VI and discuss some issues and limitations in §VII. …

Mitigating poisoning attacks on machine learning models: A data provenance based approach

N Baracaldo, B Chen, H Ludwig, JA Safavi - Proceedings of the 10th …, 2017 - dl.acm.org
… In Section 2 we present in detail the threat model. Then, in Section 3 we introduce our
provenance defense to identify poisonous data when a partially trusted data set is available. In …

Towards a threat model for provenance in e-Science

LMR Gadelha Jr, M Mattoso, M Wilde… - International Provenance …, 2010 - Springer
… This work describes our progress in defining a threat model and proposing security controls
for provenance systems in the context of e-Science. We identify the assurance of correct …

ANUBIS: a provenance graph-based framework for advanced persistent threat detection

MM Anjum, S Iqbal, B Hamelin - Proceedings of the 37th ACM/SIGAPP …, 2022 - dl.acm.org
… in-memory provenance graph analysis as it runs. Prior research that used provenance graphs
for … for detecting APTs from provenance graph data and explaining the predictions to cyber-…

Unicorn: Runtime provenance-based detector for advanced persistent threats

X Han, T Pasquier, A Bates, J Mickens… - arXiv preprint arXiv …, 2020 - arxiv.org
… that effectively leverages data provenance analysis. From modeling to detection, UNICORN
… Through extensive yet time-efficient graph analysis, UNICORN explores provenance graphs …

PROV-GEM: Automated provenance analysis framework using graph embeddings

M Kapoor, J Melton, M Ridenhour… - 2021 20th IEEE …, 2021 - ieeexplore.ieee.org
… We model the data using the W3C provenance labels for nodes and relations [20]. W3C
PROV defines three node types: agent, entity, and activity. Additionally, there are relations …

Tactical provenance analysis for endpoint detection and response systems

WU Hassan, A Bates, D Marino - 2020 IEEE Symposium on …, 2020 - ieeexplore.ieee.org
… data provenance to commercial EDR tools. We introduce the notion of Tactical Provenance
… about causal dependencies between EDR-generated threat alerts. TPGs provide compact …