Nothing Special   »   [go: up one dir, main page]

Konstantinou et al., 2022 - Google Patents

Hpc-based malware detectors actually work: Transition to practice after a decade of research

Konstantinou et al., 2022

View PDF
Document ID
10804773614821173450
Author
Konstantinou C
Wang X
Krishnamurthy P
Khorrami F
Maniatakos M
Karri R
Publication year
Publication venue
IEEE Design & Test

External Links

Snippet

HPC-Based Malware Detectors Actually Work: Transition to Practice After a Decade of Research Page 1 23 2168-2364/22©2022 IEEE Copublished by the IEEE CEDA, IEEE CASS, IEEE SSCS, and TTTC July/August 2022 HPC-Based Malware Detectors Actually Work: Transition to …
Continue reading at repository.kaust.edu.sa (PDF) (other versions)

Similar Documents

Publication Publication Date Title
Lee et al. Inferring fine-grained control flow inside {SGX} enclaves with branch shadowing
Cheng et al. Orpheus: Enforcing cyber-physical execution semantics to defend against data-oriented attacks
Saeed et al. Intelligent intrusion detection in low-power IoTs
Briongos et al. Cacheshield: Detecting cache attacks through self-observation
Xia et al. CFIMon: Detecting violation of control flow integrity using performance counters
Reeves et al. Intrusion detection for resource-constrained embedded control systems in the power grid
Cheng et al. Checking is believing: Event-aware program anomaly detection in cyber-physical systems
Harris et al. Cyclone: Detecting contention-based cache information leaks through cyclic interference
Wang et al. Comprehensive evaluation of machine learning countermeasures for detecting microarchitectural side-channel attacks
Park et al. Leveraging side-channel information for disassembly and security
Akram et al. Meet the Sherlock Holmes’ of side channel leakage: A survey of cache SCA detection techniques
Carelli et al. Performance monitor counters: Interplay between safety and security in complex cyber-physical systems
Konstantinou et al. Hpc-based malware detectors actually work: Transition to practice after a decade of research
Shen et al. Micro-architectural cache side-channel attacks and countermeasures
Kuruvila et al. Defending hardware-based malware detectors against adversarial attacks
Lee et al. Efficient security monitoring with the core debug interface in an embedded processor
Wang et al. Enabling micro ai for securing edge devices at hardware level
Brasser et al. Advances and throwbacks in hardware-assisted security: Special session
Arıkan et al. Processor security: Detecting microarchitectural attacks via count-min sketches
Zheng et al. CBA-detector: A self-feedback detector against cache-based attacks
Brasser et al. Special session: Advances and throwbacks in hardware-assisted security
Jung et al. Trusted monitor: Tee-based system monitoring
Meng et al. Built-in security computer: Deploying security-first architecture using active security processor
Zhu et al. Jintide: Utilizing low-cost reconfigurable external monitors to substantially enhance hardware security of large-scale CPU clusters
Zheng et al. CBA-detector: An accurate detector against cache-based attacks using HPCs and pintools