[PDF][PDF] ProvTalk: Towards Interpretable Multi-level Provenance Analysis in Networking Functions Virtualization (NFV).

A Tabiban, H Zhao, Y Jarraya, M Pourzandi, M Zhang… - NDSS, 2022 - researchgate.net
Network functions virtualization (NFV) enables agile deployment of network services on top
of clouds. However, as NFV involves multiple levels of abstraction representing the same …

Threat modeling at run time: the case for reflective and adaptive threat management (NIER track)

D Van Landuyt, L Pasquale, L Sion… - … for Adaptive and Self …, 2021 - ieeexplore.ieee.org
Threat modeling is an analysis activity aimed at eliciting viable and realistic security and
privacy threats in the design of a software-intensive system. Threat modeling allows for a by …

Holistic Runtime Performance and Security-aware Monitoring in Public Cloud Environment

DN Jha, G Lenton, J Asker, D Blundell… - 2022 22nd IEEE …, 2022 - ieeexplore.ieee.org
The emergence of cloud computing allows users to execute their applications in a
ubiquitous manner. Public cloud offers various ready-to-use services eg AWS EC2, Amazon …

Proactivizer: Transforming existing verification tools into efficient solutions for runtime security enforcement

S Majumdar, A Tabiban, M Mohammady… - … –ESORICS 2019: 24th …, 2019 - Springer
Security verification plays a vital role in providing users the needed security assurance in
many applications. However, applying existing verification tools for runtime security …

Cloud security auditing: Major approaches and existing challenges

S Majumdar, T Madi, Y Jarraya, M Pourzandi… - … and Practice of Security …, 2019 - Springer
Cloud computing is emerging as a promising IT solution for enabling ubiquitous, convenient,
and on-demand accesses to a shared pool of configurable computing resources. However …

VinciDecoder: Automatically Interpreting Provenance Graphs into Textual Forensic Reports with Application to OpenStack

A Tabiban, H Zhao, Y Jarraya, M Pourzandi… - Nordic Conference on …, 2022 - Springer
The operational complexity and dynamicity of clouds highlight the importance of automated
solutions for explaining the root cause of security incidents. Most existing works rely on …

Formal and Automatic Security Policy Enforcement on Android Applications by Rewriting 1

M Ziadia, M Mejri, J Fattahi - New Trends in Intelligent Software …, 2021 - ebooks.iospress.nl
With the wide variety of applications offered by Android, this system has been able to
dominate the smartphone market. These applications provide all kinds of features and …

[图书][B] Cloud security auditing

S Majumdar, T Madi, Y Wang, A Tabiban, M Oqaily… - 2019 - Springer
Auditing and security assurance verification is, and has traditionally been, essential for many
industries due to regulatory requirements. Examples of this are ISO 27001 for information …

Catching falling dominoes: cloud management-level provenance analysis with application to OpenStack

A Tabiban, Y Jarraya, M Zhang… - … IEEE Conference on …, 2020 - ieeexplore.ieee.org
The dynamicity and complexity of clouds highlight the importance of automated root cause
analysis solutions for explaining what might have caused a security incident. Most existing …

Multi-level proactive security auditing for clouds

S Majumdar, A Tabiban, M Mohammady… - … IEEE Conference on …, 2019 - ieeexplore.ieee.org
Runtime cloud security auditing plays a vital role in mitigating security concerns in a cloud.
However, there currently does not exist a comprehensive solution that can protect a cloud …