Konstantinou et al., 2022 - Google Patents
Hpc-based malware detectors actually work: Transition to practice after a decade of researchKonstantinou et al., 2022
View PDF- Document ID
- 10804773614821173450
- Author
- Konstantinou C
- Wang X
- Krishnamurthy P
- Khorrami F
- Maniatakos M
- Karri R
- Publication year
- Publication venue
- IEEE Design & Test
External Links
Snippet
HPC-Based Malware Detectors Actually Work: Transition to Practice After a Decade of Research
Page 1 23 2168-2364/22©2022 IEEE Copublished by the IEEE CEDA, IEEE CASS, IEEE SSCS,
and TTTC July/August 2022 HPC-Based Malware Detectors Actually Work: Transition to …
- 235000010977 hydroxypropyl cellulose 0 title abstract description 54
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Lee et al. | Inferring fine-grained control flow inside {SGX} enclaves with branch shadowing | |
Cheng et al. | Orpheus: Enforcing cyber-physical execution semantics to defend against data-oriented attacks | |
Saeed et al. | Intelligent intrusion detection in low-power IoTs | |
Briongos et al. | Cacheshield: Detecting cache attacks through self-observation | |
Xia et al. | CFIMon: Detecting violation of control flow integrity using performance counters | |
Reeves et al. | Intrusion detection for resource-constrained embedded control systems in the power grid | |
Cheng et al. | Checking is believing: Event-aware program anomaly detection in cyber-physical systems | |
Harris et al. | Cyclone: Detecting contention-based cache information leaks through cyclic interference | |
Wang et al. | Comprehensive evaluation of machine learning countermeasures for detecting microarchitectural side-channel attacks | |
Park et al. | Leveraging side-channel information for disassembly and security | |
Akram et al. | Meet the Sherlock Holmes’ of side channel leakage: A survey of cache SCA detection techniques | |
Carelli et al. | Performance monitor counters: Interplay between safety and security in complex cyber-physical systems | |
Konstantinou et al. | Hpc-based malware detectors actually work: Transition to practice after a decade of research | |
Shen et al. | Micro-architectural cache side-channel attacks and countermeasures | |
Kuruvila et al. | Defending hardware-based malware detectors against adversarial attacks | |
Lee et al. | Efficient security monitoring with the core debug interface in an embedded processor | |
Wang et al. | Enabling micro ai for securing edge devices at hardware level | |
Brasser et al. | Advances and throwbacks in hardware-assisted security: Special session | |
Arıkan et al. | Processor security: Detecting microarchitectural attacks via count-min sketches | |
Zheng et al. | CBA-detector: A self-feedback detector against cache-based attacks | |
Brasser et al. | Special session: Advances and throwbacks in hardware-assisted security | |
Jung et al. | Trusted monitor: Tee-based system monitoring | |
Meng et al. | Built-in security computer: Deploying security-first architecture using active security processor | |
Zhu et al. | Jintide: Utilizing low-cost reconfigurable external monitors to substantially enhance hardware security of large-scale CPU clusters | |
Zheng et al. | CBA-detector: An accurate detector against cache-based attacks using HPCs and pintools |