A survey on hypervisor-based monitoring: approaches, applications, and evolutions
When designing computer monitoring systems, one goal has always been to have a
complete view of the monitored target and at the same time stealthily protect the monitor …
complete view of the monitored target and at the same time stealthily protect the monitor …
Facial expression recognition by de-expression residue learning
A facial expression is a combination of an expressive component and a neutral component
of a person. In this paper, we propose to recognize facial expressions by extracting …
of a person. In this paper, we propose to recognize facial expressions by extracting …
Type inference on executables
In many applications, source code and debugging symbols of a target program are not
available, and the only thing that we can access is the program executable. A fundamental …
available, and the only thing that we can access is the program executable. A fundamental …
Space traveling across vm: Automatically bridging the semantic gap in virtual machine introspection via online kernel data redirection
It is generally believed to be a tedious, time consuming, and error-prone process to develop
a virtual machine introspection (VMI) tool manually because of the semantic gap. Recent …
a virtual machine introspection (VMI) tool manually because of the semantic gap. Recent …
[PDF][PDF] Enforcing Kernel Security Invariants with Data Flow Integrity.
The operation system kernel is the foundation of the whole system and is often the de facto
trusted computing base for many higher level security mechanisms. Unfortunately, kernel …
trusted computing base for many higher level security mechanisms. Unfortunately, kernel …
Acquisition and analysis of volatile memory from android devices
The Android operating system for mobile phones, which is still relatively new, is rapidly
gaining market share, with dozens of smartphones and tablets either released or set to be …
gaining market share, with dozens of smartphones and tablets either released or set to be …
Sok: Introspections on trust and the semantic gap
An essential goal of Virtual Machine Introspection (VMI) is assuring security policy
enforcement and overall functionality in the presence of an untrustworthy OS. A fundamental …
enforcement and overall functionality in the presence of an untrustworthy OS. A fundamental …
Towards automated safety vetting of smart contracts in decentralized applications
We propose VetSC, a novel UI-driven, program analysis guided model checking technique
that can automatically extract contract semantics in DApps so as to enable targeted safety …
that can automatically extract contract semantics in DApps so as to enable targeted safety …
Deepmem: Learning graph neural network models for fast and robust memory forensic analysis
Kernel data structure detection is an important task in memory forensics that aims at
identifying semantically important kernel data structures from raw memory dumps. It is …
identifying semantically important kernel data structures from raw memory dumps. It is …
{AI} Psychiatry: Forensic Investigation of Deep Learning Networks in Memory Images
Online learning is widely used in production to refine model parameters after initial
deployment. This opens several vectors for covertly launching attacks against deployed …
deployment. This opens several vectors for covertly launching attacks against deployed …