A survey on hypervisor-based monitoring: approaches, applications, and evolutions

E Bauman, G Ayoade, Z Lin - ACM Computing Surveys (CSUR), 2015 - dl.acm.org
When designing computer monitoring systems, one goal has always been to have a
complete view of the monitored target and at the same time stealthily protect the monitor …

Facial expression recognition by de-expression residue learning

H Yang, U Ciftci, L Yin - … of the IEEE conference on computer …, 2018 - openaccess.thecvf.com
A facial expression is a combination of an expressive component and a neutral component
of a person. In this paper, we propose to recognize facial expressions by extracting …

Type inference on executables

J Caballero, Z Lin - ACM Computing Surveys (CSUR), 2016 - dl.acm.org
In many applications, source code and debugging symbols of a target program are not
available, and the only thing that we can access is the program executable. A fundamental …

Space traveling across vm: Automatically bridging the semantic gap in virtual machine introspection via online kernel data redirection

Y Fu, Z Lin - 2012 IEEE symposium on security and privacy, 2012 - ieeexplore.ieee.org
It is generally believed to be a tedious, time consuming, and error-prone process to develop
a virtual machine introspection (VMI) tool manually because of the semantic gap. Recent …

[PDF][PDF] Enforcing Kernel Security Invariants with Data Flow Integrity.

C Song, B Lee, K Lu, W Harris, T Kim, W Lee - NDSS, 2016 - researchgate.net
The operation system kernel is the foundation of the whole system and is often the de facto
trusted computing base for many higher level security mechanisms. Unfortunately, kernel …

Acquisition and analysis of volatile memory from android devices

J Sylve, A Case, L Marziale, GG Richard - Digital Investigation, 2012 - Elsevier
The Android operating system for mobile phones, which is still relatively new, is rapidly
gaining market share, with dozens of smartphones and tablets either released or set to be …

Sok: Introspections on trust and the semantic gap

B Jain, MB Baig, D Zhang, DE Porter… - 2014 IEEE symposium …, 2014 - ieeexplore.ieee.org
An essential goal of Virtual Machine Introspection (VMI) is assuring security policy
enforcement and overall functionality in the presence of an untrustworthy OS. A fundamental …

Towards automated safety vetting of smart contracts in decentralized applications

Y Duan, X Zhao, Y Pan, S Li, M Li, F Xu… - Proceedings of the 2022 …, 2022 - dl.acm.org
We propose VetSC, a novel UI-driven, program analysis guided model checking technique
that can automatically extract contract semantics in DApps so as to enable targeted safety …

Deepmem: Learning graph neural network models for fast and robust memory forensic analysis

W Song, H Yin, C Liu, D Song - Proceedings of the 2018 ACM SIGSAC …, 2018 - dl.acm.org
Kernel data structure detection is an important task in memory forensics that aims at
identifying semantically important kernel data structures from raw memory dumps. It is …

{AI} Psychiatry: Forensic Investigation of Deep Learning Networks in Memory Images

D Oygenblik, C Yagemann, J Zhang, A Mastali… - 33rd USENIX Security …, 2024 - usenix.org
Online learning is widely used in production to refine model parameters after initial
deployment. This opens several vectors for covertly launching attacks against deployed …