-
Notifications
You must be signed in to change notification settings - Fork 77
Publications
-
Shozab Hussain, Musa Waseem, Turyal Neeshat, Rja Batool, Omer Ahmed, Fareed Zaffar, Ashish Gehani, Andy Poggio, and Maneesh Yadav, Towards Reproducible Ransomware Analysis, 16th Workshop on Cyber Security Experimentation and Test (CSET), 2023. [PDF]
-
Raza Ahmad, Aniket Modi, Eunjin Jung, Carolina de Senne Garcia, Hassaan Irshad, and Ashish Gehani, Analyzing Discrepancies in Whole Network Provenance, Critical Infrastructure Protection, Vol. XVII, Springer, 2023. [PDF]
-
Mashal Abbas, Shahpar Khan, Abdul Monum, Fareed Zaffar, Rashid Tahir, David Eyers, Hassaan Irshad, Ashish Gehani, Vinod Yegneswaran, and Thomas Pasquier, PACED: Provenance-based Automated Container Escape Detection, 10th IEEE International Conference on Cloud Engineering (IC2E), 2022. [PDF]
-
Hassaan Irshad, Gabriela Ciocarlie, Ashish Gehani, Vinod Yegneswaran, Kyu Lee, Jignesh Patel, Somesh Jha, Yonghwi Kwon, Dongyan Xu, and Xiangyu Zhang, TRACE: Enterprise-Wide Provenance Tracking For Real-Time APT Detection, IEEE Transactions on Information Forensics and Security (TIFS), 2021. [PDF]
-
Ashish Gehani, Raza Ahmad, and Hassaan Irshad, Practical Provenance Privacy Protection, 13th USENIX Workshop on the Theory and Practice of Provenance (TaPP), 2021. [PDF]
-
Ashish Gehani, Raza Ahmad, Hassaan Irshad, Jianqiao Zhu, and Jignesh Patel, Digging Into "Big Provenance" (With SPADE), ACM Queue, Vol. 19(3), 2021. [PDF]
-
Xutong Chen, Hassaan Irshad, Yan Chen, Ashish Gehani, and Vinod Yegneswaran, Clarion: Sound and Clear Provenance Tracking for Microservice Deployments, 30th USENIX Security Symposium, 2021. [PDF]
-
Raza Ahmad, Eunjin Jung, Carolina de Senne Garcia, Hassaan Irshad, and Ashish Gehani, Discrepancy Detection in Whole Network Provenance, 12th USENIX Workshop on the Theory and Practice of Provenance (TaPP), 2020. [PDF]
-
Sheung Chi Chan, James Cheney, Pramod Bhatotia, Thomas Pasquier, Ashish Gehani, Hassaan Irshad, Lucian Carata, and Margo Seltzer, ProvMark: A Provenance Expressiveness Benchmarking System, 20th ACM/IFIP International Middleware Conference, 2019. [PDF]
-
Mathieu Barre, Ashish Gehani, and Vinod Yegneswaran, Mining Data Provenance to Detect Advanced Persistent Threats, 11th USENIX Workshop on the Theory and Practice of Provenance (TaPP), 2019. [PDF]
-
Raza Ahmad, Melanie Bru, and Ashish Gehani, Streaming Provenance Compression, Provenance and Annotation of Data and Processes, Lecture Notes in Computer Science, Vol. 11017, Springer, 2018. [PDF]
-
Sheung Chi Chan, Ashish Gehani, James Cheney, Ripduman Sohan, and Hassaan Irshad, Expressiveness Benchmarking for System-Level Provenance, 9th USENIX Workshop on the Theory and Practice of Provenance (TaPP), 2017. [PDF]
-
Ashish Gehani, Hasanat Kazmi, and Hassaan Irshad, Scaling SPADE to "Big Provenance", 8th USENIX Workshop on the Theory and Practice of Provenance (TaPP), 2016. [PDF]
-
Manolis Stamatogiannakis, Hasanat Kazmi, Hashim Sharif, Remco Vermeulen, Ashish Gehani, Herbert Bos, and Paul Groth, Tradeoffs in Automatic Provenance Capture, 6th International Provenance and Annotation Workshop (IPAW), 2016. [PDF]
-
Chao Yang, Guangliang Yang, Ashish Gehani, Vinod Yegneswaran, Dawood Tariq, and Guofei Gu, Using Provenance Patterns to Vet Sensitive Behaviors in Android Apps, 11th International Conference on Security and Privacy in Communication Networks (SecureComm), 2015. [PDF]
-
Ashish Gehani and Dawood Tariq, Provenance-Only Integration, 6th USENIX Workshop on the Theory and Practice of Provenance (TaPP), 2014. [PDF]
-
Scott Moore, Ashish Gehani, and Natarajan Shankar, Declaratively Processing Provenance Metadata, 5th USENIX Workshop on the Theory and Practice of Provenance (TaPP) affiliated with the 10th USENIX Symposium on Networked Systems Design and Implementation (NSDI), 2013. [PDF]
-
Nathaniel Husted, Sharjeel Qureshi, Dawood Tariq, and Ashish Gehani, Android Provenance: Diagnosing Device Disorders, 5th USENIX Workshop on the Theory and Practice of Provenance (TaPP) affiliated with the 10th USENIX Symposium on Networked Systems Design and Implementation (NSDI), 2013. [PDF]
-
Ashish Gehani and Dawood Tariq, Cross-Platform Provenance, 1st Provenance Benchmark Challenge (ProvBench) affiliated with the 16th International Conference on Extending Database Technology (EDBT) and 16th International Conference on Database Theory (ICDT), 2013. [PDF]
-
Hasnain Lakhani, Rashid Tahir, Azeem Aqil, Fareed Zaffar, Dawood Tariq, and Ashish Gehani, Optimized Rollback and Re-computation, 46th IEEE Hawaii International Conference on Systems Science (HICSS), IEEE Computer Society, 2013. [PDF]
-
Tanu Malik, Ashish Gehani, Dawood Tariq, and Fareed Zaffar, Sketching Distributed Data Provenance, Data Provenance and Data Management for eScience, Studies in Computational Intelligence, Vol. 426, Springer, 2013. [PDF]
-
Ashish Gehani and Dawood Tariq, SPADE: Support for Provenance Auditing in Distributed Environments, 13th ACM/IFIP/USENIX International Conference on Middleware, 2012. [PDF]
-
Dawood Tariq, Maisem Ali, and Ashish Gehani, Towards Automated Collection of Application-Level Data Provenance, 4th USENIX Workshop on the Theory and Practice of Provenance (TaPP), affiliated with the 23rd USENIX Annual Technical Conference (ATC), 2012. [PDF]
-
Ashish Gehani, Dawood Tariq, Basim Baig, and Tanu Malik, Policy-Based Integration of Provenance Metadata, 12th IEEE International Symposium on Policies for Distributed Systems and Networks (POLICY), 2011. [PDF]
Note: The papers above use SPADEv2, while those below use SPADEv1 or its predecessors.
- Dawood Tariq, Basim Baig, Ashish Gehani, Salman Mahmood, Rashid Tahir, Azeem Aqil, and Fareed Zaffar, Identifying the Provenance of Correlated Anomalies, 26th ACM Symposium on Applied Computing (SAC), 2011. [PDF]
- Tanu Malik, Ligia Nistor, and Ashish Gehani, Tracking and Sketching Distributed Data Provenance, 6th IEEE International Conference on e-Science, 2010. [PDF]
-
Ashish Gehani, Basim Baig, Salman Mahmood, Dawood Tariq, and Fareed Zaffar, Fine-Grained Tracking of Grid Infections, 11th ACM/IEEE International Conference on Grid Computing (GRID), 2010. [PDF]
-
Ashish Gehani and Minyoung Kim, Mendel: Efficiently Verifying the Lineage of Data Modified in Multiple Trust Domains, 19th ACM International Symposium on High Performance Distributed Computing (HPDC), 2010. [PDF]
-
Ashish Gehani, Minyoung Kim, and Tanu Malik, Efficient Querying of Distributed Provenance Stores, 8th Workshop on the Challenges of Large Applications in Distributed Environments (CLADE) affiliated with the 19th ACM International Symposium on High Performance Distributed Computing (HPDC), 2010. [PDF]
-
Ashish Gehani, Minyoung Kim, and Jian Zhang, Steps Toward Managing Lineage Metadata in Grid Clusters, 1st Workshop on the Theory and Practice of Provenance (TaPP) affiliated with the 7th USENIX Conference on File and Storage Technologies (FAST), 2009. [PDF]
-
Ashish Gehani, Florent Kirchner, and Natarajan Shankar, System Support for Forensic Inference, Advances in Digital Forensics V, Springer, Vol. 306, 2009. [PDF]
-
Ashish Gehani and Ulf Lindqvist, Bonsai: Balanced Lineage Authentication, 23rd Annual Computer Security Applications Conference (ACSAC), IEEE Computer Society, 2007. [PDF]
-
Ashish Gehani and Ulf Lindqvist, VEIL: A System for Certifying Video Provenance, 9th IEEE International Symposium on Multimedia (ISM), 2007. [PDF]
This material is based upon work supported by the National Science Foundation under Grants OCI-0722068, IIS-1116414, and ACI-1547467. Any opinions, findings, and conclusions or recommendations expressed in this material are those of the author(s) and do not necessarily reflect the views of the National Science Foundation.
- Setting up SPADE
- Storing provenance
-
Collecting provenance
- Across the operating system
- Limiting collection to a part of the filesystem
- From an external application
- With compile-time instrumentation
- Using the reporting API
- Of transactions in the Bitcoin blockchain
- Filtering provenance
- Viewing provenance
-
Querying SPADE
- Illustrative example
- Transforming query responses
- Protecting query responses
- Miscellaneous