Using deep learning to solve computer security challenges: a survey

YH Choi, P Liu, Z Shang, H Wang, Z Wang, L Zhang… - Cybersecurity, 2020‏ - Springer
Although using machine learning techniques to solve computer security challenges is not a
new idea, the rapidly emerging Deep Learning technology has recently triggered a …

HARM: Hardware-assisted continuous re-randomization for microcontrollers

J Shi, L Guan, W Li, D Zhang, P Chen… - 2022 IEEE 7th …, 2022‏ - ieeexplore.ieee.org
Microcontroller-based embedded systems have become ubiquitous with the emergence of
IoT technology. Given its critical roles in many applications, its security is becoming …

Memory Integrity Techniques for Memory-Unsafe Languages: A Survey

VE Moghadam, G Serra, F Aromolo, G Buttazzo… - IEEE …, 2024‏ - ieeexplore.ieee.org
The complexity of modern software systems, the integration of several software components,
and the increasing exposure to public networks make systems more susceptible to cyber …

Tackling imbalanced data in cybersecurity with transfer learning: A case with ROP payload detection

H Wang, A Singhal, P Liu - Cybersecurity, 2023‏ - Springer
In recent years, deep learning gained proliferating popularity in the cybersecurity application
domain, since when being compared to traditional machine learning methods, it usually …

SGX-LEGO: Fine-grained SGX controlled-channel attack and its countermeasure

D Kim, D Jang, M Park, Y Jeong, J Kim, S Choi… - computers & …, 2019‏ - Elsevier
Abstract The introduction of Intel Software Guard eXtension (SGX) prompted security
researchers to verify its effectiveness. One of the frequently discussed attacks against SGX is …

Detecting return-oriented programming on firmware-only embedded devices using hardware performance counters

A Omotosho, GB Welearegai, C Hammer - Proceedings of the 37th ACM …, 2022‏ - dl.acm.org
Return-oriented programming (ROP) relies on in-memory code sequences ending in return
instructions to chain together arbitrary malware. ROP is one of the most dangerous security …

PwIN–Pwning Intel piN: Why DBI is unsuitable for security applications

J Kirsch, Z Zhechev, B Bierbaumer, T Kittel - … 3-7, 2018, Proceedings, Part I …, 2018‏ - Springer
Binary instrumentation is a robust and powerful technique which facilitates binary code
modification of computer programs even when no source code is available. This is achieved …

Identification of return-oriented programming attacks using risc-v instruction trace data

DF Koranek, SR Graham, BJ Borghetti… - IEEE Access, 2022‏ - ieeexplore.ieee.org
An increasing number of embedded systems include dedicated neural hardware. To benefit
from this specialized hardware, deep learning techniques to discover malware on …

Use of ensemble learning to detect buffer overflow exploitation

A Youssef, M Abdelrazek, C Karmakar - IEEE Access, 2023‏ - ieeexplore.ieee.org
Software exploitation detection remains unresolved problem. Software exploits that target
known and unknown vulnerabilities are constantly used in attacks. Signature-based …

DeepCheck: a non-intrusive control-flow integrity checking based on deep learning

J Zhang, W Chen, Y Niu - arxiv preprint arxiv:1905.01858, 2019‏ - arxiv.org
Code reuse attack (CRA) is a powerful attack that reuses existing codes to hijack the
program control flow. Control flow integrity (CFI) is one of the most popular mechanisms to …