Media Summary: ATLAS: A Sequence-based Learning Approach for Attack Investigation Abdulellah Alsaheel and Yuhong Nan, Purdue University; ... Blanket Execution: Dynamic Similarity Testing for Program Binaries and Components Manuel Egele, Maverick Woo, Peter ... Acoustics to the Rescue: Physical Key Inference Attack Revisited Soundarya Ramesh and Rui Xiao, National University of ...

Usenix Security 21 Hopper Modeling And Detecting Lateral Movement - Detailed Analysis & Overview

ATLAS: A Sequence-based Learning Approach for Attack Investigation Abdulellah Alsaheel and Yuhong Nan, Purdue University; ... Blanket Execution: Dynamic Similarity Testing for Program Binaries and Components Manuel Egele, Maverick Woo, Peter ... Acoustics to the Rescue: Physical Key Inference Attack Revisited Soundarya Ramesh and Rui Xiao, National University of ... Tim Keeler, General Manager and CTO at Netwrix, and Nick Holland from ISMG share step-by-step details on how

Photo Gallery

USENIX Security '21 - Hopper: Modeling and Detecting Lateral Movement
USENIX Security '20 - ShadowMove: A Stealthy Lateral Movement Strategy
USENIX Security '21 - Double-Cross Attacks: Subverting Active Learning Systems
USENIX Security '21 - ATLAS: A Sequence-based Learning Approach for Attack Investigation
USENIX Security '22 - Morphuzz: Bending (Input) Space to Fuzz Virtual Devices
USENIX Security '14 - Blanket Execution: Dynamic Similarity Testing for Program Binaries
USENIX Security '21 - Acoustics to the Rescue: Physical Key Inference Attack Revisited
Lateral movement detection with LATMA (LATeral Movement Analyzer) | Gal Sadeh (Silverfort)
USENIX ATC '24 - Models on the Move: Towards Feasible Embedded AI for Intrusion Detection on...
USENIX Security '23 - Exploring User Reactions and Mental Models Towards Perceptual Manipulation...
The Challenge of Detecting Lateral Movement
Detecting Lateral Movement in Enterprise Computer Networks with Unsupervised Graph AI - RAID 2020
Sponsored
View Detailed Profile
USENIX Security '21 - Hopper: Modeling and Detecting Lateral Movement

USENIX Security '21 - Hopper: Modeling and Detecting Lateral Movement

Hopper

USENIX Security '20 - ShadowMove: A Stealthy Lateral Movement Strategy

USENIX Security '20 - ShadowMove: A Stealthy Lateral Movement Strategy

ShadowMove: A Stealthy

USENIX Security '21 - Double-Cross Attacks: Subverting Active Learning Systems

USENIX Security '21 - Double-Cross Attacks: Subverting Active Learning Systems

USENIX Security

USENIX Security '21 - ATLAS: A Sequence-based Learning Approach for Attack Investigation

USENIX Security '21 - ATLAS: A Sequence-based Learning Approach for Attack Investigation

ATLAS: A Sequence-based Learning Approach for Attack Investigation Abdulellah Alsaheel and Yuhong Nan, Purdue University; ...

USENIX Security '22 - Morphuzz: Bending (Input) Space to Fuzz Virtual Devices

USENIX Security '22 - Morphuzz: Bending (Input) Space to Fuzz Virtual Devices

USENIX Security

Sponsored
USENIX Security '14 - Blanket Execution: Dynamic Similarity Testing for Program Binaries

USENIX Security '14 - Blanket Execution: Dynamic Similarity Testing for Program Binaries

Blanket Execution: Dynamic Similarity Testing for Program Binaries and Components Manuel Egele, Maverick Woo, Peter ...

USENIX Security '21 - Acoustics to the Rescue: Physical Key Inference Attack Revisited

USENIX Security '21 - Acoustics to the Rescue: Physical Key Inference Attack Revisited

Acoustics to the Rescue: Physical Key Inference Attack Revisited Soundarya Ramesh and Rui Xiao, National University of ...

Lateral movement detection with LATMA (LATeral Movement Analyzer) | Gal Sadeh (Silverfort)

Lateral movement detection with LATMA (LATeral Movement Analyzer) | Gal Sadeh (Silverfort)

Lateral movement

USENIX ATC '24 - Models on the Move: Towards Feasible Embedded AI for Intrusion Detection on...

USENIX ATC '24 - Models on the Move: Towards Feasible Embedded AI for Intrusion Detection on...

Models on the

USENIX Security '23 - Exploring User Reactions and Mental Models Towards Perceptual Manipulation...

USENIX Security '23 - Exploring User Reactions and Mental Models Towards Perceptual Manipulation...

USENIX Security

The Challenge of Detecting Lateral Movement

The Challenge of Detecting Lateral Movement

Tim Keeler, General Manager and CTO at Netwrix, and Nick Holland from ISMG share step-by-step details on how

Detecting Lateral Movement in Enterprise Computer Networks with Unsupervised Graph AI - RAID 2020

Detecting Lateral Movement in Enterprise Computer Networks with Unsupervised Graph AI - RAID 2020

This is our work "

MITRE 'Lateral Movement' explained under 1 minute

MITRE 'Lateral Movement' explained under 1 minute

In the