Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Using deep learning to solve computer security challenges: a survey
Although using machine learning techniques to solve computer security challenges is not a
new idea, the rapidly emerging Deep Learning technology has recently triggered a …
new idea, the rapidly emerging Deep Learning technology has recently triggered a …
HARM: Hardware-assisted continuous re-randomization for microcontrollers
Microcontroller-based embedded systems have become ubiquitous with the emergence of
IoT technology. Given its critical roles in many applications, its security is becoming …
IoT technology. Given its critical roles in many applications, its security is becoming …
Memory Integrity Techniques for Memory-Unsafe Languages: A Survey
The complexity of modern software systems, the integration of several software components,
and the increasing exposure to public networks make systems more susceptible to cyber …
and the increasing exposure to public networks make systems more susceptible to cyber …
Tackling imbalanced data in cybersecurity with transfer learning: A case with ROP payload detection
In recent years, deep learning gained proliferating popularity in the cybersecurity application
domain, since when being compared to traditional machine learning methods, it usually …
domain, since when being compared to traditional machine learning methods, it usually …
SGX-LEGO: Fine-grained SGX controlled-channel attack and its countermeasure
Abstract The introduction of Intel Software Guard eXtension (SGX) prompted security
researchers to verify its effectiveness. One of the frequently discussed attacks against SGX is …
researchers to verify its effectiveness. One of the frequently discussed attacks against SGX is …
Detecting return-oriented programming on firmware-only embedded devices using hardware performance counters
Return-oriented programming (ROP) relies on in-memory code sequences ending in return
instructions to chain together arbitrary malware. ROP is one of the most dangerous security …
instructions to chain together arbitrary malware. ROP is one of the most dangerous security …
PwIN–Pwning Intel piN: Why DBI is unsuitable for security applications
J Kirsch, Z Zhechev, B Bierbaumer, T Kittel - … 3-7, 2018, Proceedings, Part I …, 2018 - Springer
Binary instrumentation is a robust and powerful technique which facilitates binary code
modification of computer programs even when no source code is available. This is achieved …
modification of computer programs even when no source code is available. This is achieved …
Identification of return-oriented programming attacks using risc-v instruction trace data
An increasing number of embedded systems include dedicated neural hardware. To benefit
from this specialized hardware, deep learning techniques to discover malware on …
from this specialized hardware, deep learning techniques to discover malware on …
Use of ensemble learning to detect buffer overflow exploitation
Software exploitation detection remains unresolved problem. Software exploits that target
known and unknown vulnerabilities are constantly used in attacks. Signature-based …
known and unknown vulnerabilities are constantly used in attacks. Signature-based …
DeepCheck: a non-intrusive control-flow integrity checking based on deep learning
Code reuse attack (CRA) is a powerful attack that reuses existing codes to hijack the
program control flow. Control flow integrity (CFI) is one of the most popular mechanisms to …
program control flow. Control flow integrity (CFI) is one of the most popular mechanisms to …