WATSON: Abstracting Behaviors from Audit Logs via Aggregation of Contextual Semantics. J Zeng, ZL Chua, Y Chen, K Ji, Z Liang, J Mao NDSS, 2021 | 70 | 2021 |
Shadewatcher: Recommendation-guided cyber threat analysis using system audit records J Zeng, X Wang, J Liu, Y Chen, Z Liang, TS Chua, ZL Chua 2022 IEEE Symposium on Security and Privacy (SP), 489-506, 2022 | 54 | 2022 |
Automatic root cause analysis via large language models for cloud incidents Y Chen, H Xie, M Ma, Y Kang, X Gao, L Shi, Y Cao, X Gao, H Fan, M Wen, ... Proceedings of the Nineteenth European Conference on Computer Systems, 674-688, 2024 | 21* | 2024 |
Sok: History is a vast early warning system: Auditing the provenance of system intrusions MA Inam, Y Chen, A Goyal, J Liu, J Mink, N Michael, S Gaur, A Bates, ... 2023 IEEE Symposium on Security and Privacy (SP), 2620-2638, 2023 | 21 | 2023 |
{Push-Button} Reliability Testing for {Cloud-Backed} Applications with Rainmaker Y Chen, X Sun, S Nath, Z Yang, T Xu 20th USENIX Symposium on Networked Systems Design and Implementation (NSDI …, 2023 | 6 | 2023 |
Configuration Validation with Large Language Models X Lian, Y Chen, R Cheng, J Huang, P Thakkar, T Xu arXiv preprint arXiv:2310.09690, 2023 | 3 | 2023 |