Abstract: Ever-growing cyber attacks threaten organizational and national security. Provenance graph analysis effectively detects attacks through system audit anomalies but demands prohibitively ...