Publications

Research papers in security, machine learning, and systems

Publication Timeline

2024
5 publications
IEEE Symposium on Security and Privacy

R-CAID: Embedding Root Cause Analysis within Provenance-based Intrusion Detection

Akul Goyal, Gang Wang, Adam Bates

arXiv preprint

ORCHID: Streaming Threat Detection over Versioned Provenance Graphs

Akul Goyal, Jason Liu, Adam Bates, Gang Wang

arXiv preprint

Class-based Subset Selection for Transfer Learning under Extreme Label Shift

Akul Goyal, Carl Edwards

In Submission

Crossing Streams: Applying Domain Generalization to Static Malware Analysis

Akul Goyal, Adam Bates, Michael R. Smith

In Submission

What We Talk About When We Talk About Logs: Understanding the Effects of Dataset Quality on Endpoint Threat Detection Research

Jason Liu, Muhammad Adil Inam, Akul Goyal, Andy Riddle, Kim Westfall, Adam Bates

2023
2 publications
Network and Distributed System Security Symposium

Sometimes, you aren't what you do: Mimicry attacks against provenance graph host intrusion detection systems

Akul Goyal, Xueyuan Vanbastelaer, Gang Wang, Adam Bates

IEEE Symposium on Security and Privacy

SoK: History is a vast early warning system: Auditing the provenance of system intrusions

Muhammad Adil Inam, Yinfang Chen, Akul Goyal, Jason Liu, Jaron Mink, Noor Michael, Sneha Gaur, Adam Bates, and Wajih Ul Hassan

2022
1 publications
Annual Computer Security Applications Conference

FAuST: Striking a bargain between forensic auditing's security and throughput

Muhammad Adil Inam, Akul Goyal, Jason Liu, Jaron Mink, Noor Michael, Sneha Gaur, Adam Bates, and Wajih Ul Hassan

2019
1 publications
Master Thesis

Semi-Supervised Boosting Via Self Labeling

Akul Goyal, Yang Liu

Published Papers

R-CAID: Embedding Root Cause Analysis within Provenance-based Intrusion Detection

Akul Goyal, Gang Wang, Adam Bates

IEEE Symposium on Security and Privacy (S&P) (2024)

Top-tier Security Conference

ORCHID: Streaming Threat Detection over Versioned Provenance Graphs

Akul Goyal, Jason Liu, Adam Bates, Gang Wang

arXiv preprint (2024)

Class-based Subset Selection for Transfer Learning under Extreme Label Shift

Akul Goyal, Carl Edwards

arXiv preprint (2024)

Sometimes, you aren't what you do: Mimicry attacks against provenance graph host intrusion detection systems

Akul Goyal, Xueyuan Vanbastelaer, Gang Wang, Adam Bates

Network and Distributed System Security Symposium (NDSS) (2023)

Top-tier Security Conference

SoK: History is a vast early warning system: Auditing the provenance of system intrusions

Muhammad Adil Inam, Yinfang Chen, Akul Goyal, Jason Liu, Jaron Mink, Noor Michael, Sneha Gaur, Adam Bates, and Wajih Ul Hassan

IEEE Symposium on Security and Privacy (S&P) (2023)

Top-tier Security Conference

FAuST: Striking a bargain between forensic auditing's security and throughput

Muhammad Adil Inam, Akul Goyal, Jason Liu, Jaron Mink, Noor Michael, Sneha Gaur, Adam Bates, and Wajih Ul Hassan

Annual Computer Security Applications Conference (ACSAC) (2022)

Semi-Supervised Boosting Via Self Labeling

Akul Goyal, Yang Liu

Master Thesis (2019)

Papers Under Review

Crossing Streams: Applying Domain Generalization to Static Malware Analysis

Akul Goyal, Adam Bates, Michael R. Smith

In Submission (2024)

What We Talk About When We Talk About Logs: Understanding the Effects of Dataset Quality on Endpoint Threat Detection Research

Jason Liu, Muhammad Adil Inam, Akul Goyal, Andy Riddle, Kim Westfall, Adam Bates

In Submission (2024)