Login / Signup
Xueyuan Han
ORCID
Publication Activity (10 Years)
Years Active: 2016-2024
Publications (10 Years): 27
Top Topics
Intrusion Detection
Top Venues
CoRR
SoCC
NDSS
CCS
</>
Publications
</>
Xuechun Cao
,
Shaurya Patel
,
Soo-Yee Lim
,
Xueyuan Han
,
Thomas Pasquier
FetchBPF: Customizable Prefetching Policies in Linux with eBPF.
USENIX ATC
(2024)
Soo-Yee Lim
,
Sidhartha Agrawal
,
Xueyuan Han
,
David M. Eyers
,
Dan O'Keeffe
,
Thomas Pasquier
Securing Monolithic Kernels using Compartmentalization.
CoRR
(2024)
Soo-Yee Lim
,
Xueyuan Han
,
Thomas Pasquier
Unleashing Unprivileged eBPF Potential with Dynamic Sandboxing.
CoRR
(2023)
Zijun Cheng
,
Qiujian Lv
,
Jinyuan Liang
,
Yan Wang
,
Degang Sun
,
Thomas Pasquier
,
Xueyuan Han
Kairos: Practical Intrusion Detection and Investigation using Whole-system Provenance.
CoRR
(2023)
Soo-Yee Lim
,
Xueyuan Han
,
Thomas Pasquier
Unleashing Unprivileged eBPF Potential with Dynamic Sandboxing.
eBPF@SIGCOMM
(2023)
Akul Goyal
,
Xueyuan Han
,
Gang Wang
,
Adam Bates
Sometimes, You Aren't What You Do: Mimicry Attacks against Provenance Graph Host Intrusion Detection Systems.
NDSS
(2023)
Xueyuan Han
,
James Mickens
,
Siddhartha Sen
Splice: Efficiently Removing a User's Data from In-memory Application State.
CCS
(2023)
Soo-Yee Lim
,
Bogdan Stelea
,
Xueyuan Han
,
Thomas F. J.-M. Pasquier
Secure Namespaced Kernel Audit for Containers.
SoCC
(2021)
Soo-Yee Lim
,
Bogdan Stelea
,
Xueyuan Han
,
Thomas F. J.-M. Pasquier
Secure Namespaced Kernel Audit for Containers.
CoRR
(2021)
Xueyuan Han
,
Xiao Yu
,
Thomas F. J.-M. Pasquier
,
Ding Li
,
Junghwan Rhee
,
James W. Mickens
,
Margo I. Seltzer
,
Haifeng Chen
SIGL: Securing Software Installations Through Deep Graph Learning.
USENIX Security Symposium
(2021)
Xueyuan Han
,
James Mickens
,
Ashish Gehani
,
Margo I. Seltzer
,
Thomas F. J.-M. Pasquier
Xanthus: Push-button Orchestration of Host Provenance Data Collection.
CoRR
(2020)
Xueyuan Han
,
James Mickens
,
Ashish Gehani
,
Margo I. Seltzer
,
Thomas F. J.-M. Pasquier
Xanthus: Push-button Orchestration of Host Provenance Data Collection.
P-RECS@HPDC
(2020)
Xueyuan Han
,
Thomas F. J.-M. Pasquier
,
Adam Bates
,
James Mickens
,
Margo I. Seltzer
Unicorn: Runtime Provenance-Based Detector for Advanced Persistent Threats.
NDSS
(2020)
Xueyuan Han
,
Thomas F. J.-M. Pasquier
,
Adam Bates
,
James Mickens
,
Margo I. Seltzer
UNICORN: Runtime Provenance-Based Detector for Advanced Persistent Threats.
CoRR
(2020)
Xueyuan Han
,
Xiao Yu
,
Thomas F. J.-M. Pasquier
,
Ding Li
,
Junghwan Rhee
,
James Mickens
,
Margo I. Seltzer
,
Haifeng Chen
SIGL: Securing Software Installations Through Deep Graph Learning.
CoRR
(2020)
Thomas F. J.-M. Pasquier
,
Matthew K. Lau
,
Xueyuan Han
,
Elizabeth Fong
,
Barbara Staudt Lerner
,
Emery R. Boose
,
Mercè Crosas
,
Aaron M. Ellison
,
Margo I. Seltzer
Sharing and Preserving Computational Analyses for Posterity with encapsulator.
CoRR
(2018)
Xueyuan Han
,
Thomas F. J.-M. Pasquier
,
Margo I. Seltzer
Provenance-based Intrusion Detection: Opportunities and Challenges.
CoRR
(2018)
Thomas F. J.-M. Pasquier
,
Matthew K. Lau
,
Xueyuan Han
,
Elizabeth Fong
,
Barbara Staudt Lerner
,
Emery R. Boose
,
Mercè Crosas
,
Aaron M. Ellison
,
Margo I. Seltzer
Sharing and Preserving Computational Analyses for Posterity with encapsulator.
Comput. Sci. Eng.
20 (4) (2018)
Thomas F. J.-M. Pasquier
,
Xueyuan Han
,
Thomas Moyer
,
Adam Bates
,
Olivier Hermant
,
David M. Eyers
,
Jean Bacon
,
Margo I. Seltzer
Runtime Analysis of Whole-System Provenance.
CoRR
(2018)
Xueyuan Han
,
Thomas F. J.-M. Pasquier
,
Margo I. Seltzer
Provenance-based Intrusion Detection: Opportunities and Challenges.
TaPP
(2018)
Thomas F. J.-M. Pasquier
,
Xueyuan Han
,
Thomas Moyer
,
Adam Bates
,
Olivier Hermant
,
David M. Eyers
,
Jean Bacon
,
Margo I. Seltzer
Runtime Analysis of Whole-System Provenance.
CCS
(2018)
Thomas F. J.-M. Pasquier
,
Xueyuan Han
,
Mark Goldstein
,
Thomas Moyer
,
David M. Eyers
,
Margo I. Seltzer
,
Jean Bacon
Practical whole-system provenance capture.
SoCC
(2017)
Thomas F. J.-M. Pasquier
,
Xueyuan Han
,
Mark Goldstein
,
Thomas Moyer
,
David M. Eyers
,
Margo I. Seltzer
,
Jean Bacon
Practical Whole-System Provenance Capture.
CoRR
(2017)
Muhammad Ali Gulzar
,
Matteo Interlandi
,
Xueyuan Han
,
Mingda Li
,
Tyson Condie
,
Miryung Kim
Automated debugging in data-intensive scalable computing.
SoCC
(2017)
Xueyuan Han
,
Thomas F. J.-M. Pasquier
,
Tanvi Ranjan
,
Mark Goldstein
,
Margo I. Seltzer
FRAPpuccino: Fault-detection through Runtime Analysis of Provenance.
HotCloud
(2017)
Xueyuan Han
,
Thomas F. J.-M. Pasquier
,
Tanvi Ranjan
,
Mark Goldstein
,
Margo I. Seltzer
FRAPpuccino: Fault-detection through Runtime Analysis of Provenance.
CoRR
(2017)
Muhammad Ali Gulzar
,
Xueyuan Han
,
Matteo Interlandi
,
Shaghayegh Mardani
,
Sai Deep Tetali
,
Todd D. Millstein
,
Miryung Kim
Interactive Debugging for Big Data Analytics.
HotCloud
(2016)