Dynamic malware analysis in the modern era—A state of the art survey

O Or-Meir, N Nissim, Y Elovici, L Rokach - ACM Computing Surveys …, 2019 - dl.acm.org
Although malicious software (malware) has been around since the early days of computers,
the sophistication and innovation of malware has increased over the years. In particular, the …

SoK: cryptojacking malware

E Tekiner, A Acar, AS Uluagac, E Kirda… - 2021 IEEE European …, 2021 - ieeexplore.ieee.org
Emerging blockchain and cryptocurrency-based technologies are redefining the way we
conduct business in cyberspace. Today, a myriad of blockchain and cryp-tocurrency …

Dos and don'ts of machine learning in computer security

D Arp, E Quiring, F Pendlebury, A Warnecke… - 31st USENIX Security …, 2022 - usenix.org
With the growing processing power of computing systems and the increasing availability of
massive datasets, machine learning algorithms have led to major breakthroughs in many …

Intelligent and behavioral-based detection of malware in IoT spectrum sensors

AH Celdrán, PMS Sánchez, MA Castillo… - International Journal of …, 2023 - Springer
Abstract The number of Cyber-Physical Systems (CPS) available in industrial environments
is growing mainly due to the evolution of the Internet-of-Things (IoT) paradigm. In such a …

Deepware: Imaging performance counters with deep learning to detect ransomware

GO Ganfure, CF Wu, YH Chang… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
In the year passed, rarely a month passes without a ransomware incident being published in
a newspaper or social media. In addition to the rise in the frequency of ransomware attacks …

WHISPER: A tool for run-time detection of side-channel attacks

M Mushtaq, J Bricq, MK Bhatti, A Akram… - IEEE …, 2020 - ieeexplore.ieee.org
High resolution and stealthy attacks and their variants such as Flush+ Reload, Flush+ Flush,
Prime+ Probe, Spectre and Meltdown have completely exposed the vulnerabilities in Intel's …

" Get in Researchers; We're Measuring Reproducibility": A Reproducibility Study of Machine Learning Papers in Tier 1 Security Conferences

D Olszewski, A Lu, C Stillman, K Warren… - Proceedings of the …, 2023 - dl.acm.org
Reproducibility is crucial to the advancement of science; it strengthens confidence in
seemingly contradictory results and expands the boundaries of known discoveries …

Survey of transient execution attacks and their mitigations

W **ong, J Szefer - ACM Computing Surveys (CSUR), 2021 - dl.acm.org
Transient execution attacks, also known as speculative execution attacks, have drawn much
interest in the last few years as they can cause critical data leakage. Since the first …

[PDF][PDF] Copy-on-Flip: Hardening ECC Memory Against Rowhammer Attacks.

A Di Dio, K Koning, H Bos, C Giuffrida - NDSS, 2023 - academia.edu
Despite nearly decade-long mitigation efforts in academia and industry, the community is yet
to find a practical solution to the Rowhammer vulnerability. Comprehensive software …

Hardware-assisted malware detection and localization using explainable machine learning

Z Pan, J Sheldon, P Mishra - IEEE Transactions on Computers, 2022 - ieeexplore.ieee.org
Malicious software, popularly known as malware, is widely acknowledged as a serious
threat to modern computing systems. Software-based solutions, such as anti-virus software …