On the feasibility of malware unpacking via hardware-assisted loop profiling

B Cheng, EA Leal, H Zhang, J Ming - 32nd USENIX Security Symposium …, 2023 - usenix.org
Hardware Performance Counters (HPCs) are built-in registers of modern processors to
count the occurrences of various micro-architectural events. Measuring HPCs values is a …

[PDF][PDF] A cautionary tale about detecting malware using hardware performance counters and machine learning

B Zhou, A Gupta, R Jahanshahi, M Egele, A Joshi - IEEE Design & Test, 2021 - megele.io
Electrical and Computer Engineering Department, Boston University, Boston, MA 02215
USA the program's behavior. As software-level behavioral analysis performs malware …

Terminator: A Secure Coprocessor to Accelerate Real-Time AntiViruses Using Inspection Breakpoints

M Botacin, FB Moreira, POA Navaux, A Grégio… - ACM Transactions on …, 2022 - dl.acm.org
AntiViruses (AVs) are essential to face the myriad of malware threatening Internet users. AVs
operate in two modes: on-demand checks and real-time verification. Software-based real …

Sealpk: Sealable protection keys for risc-v

L Delshadtehrani, S Canakci, M Egele… - … Design, Automation & …, 2021 - ieeexplore.ieee.org
With the continuous increase in the number of software-based attacks, there has been a
growing effort towards isolating sensitive data and trusted software components from …

MazeRunner: evaluating the attack surface of control-flow integrity policies

D Zeng, B Niu, G Tan - … on Trust, Security and Privacy in …, 2021 - ieeexplore.ieee.org
Control-Flow Integrity (CFI) enforces a control-flow graph (CFG) to limit attackers' ability to
manipulate runtime control flow. CFI variations, enforcing different CFGs, achieve different …

Pythia: Compiler-Guided Defense Against Non-Control Data Attacks

S Khan, B Chatterjee, S Pande - Proceedings of the 29th ACM …, 2024 - dl.acm.org
Modern C/C++ applications are susceptible to Non-Control Data Attacks, where an
adversary attempts to exploit memory corruption vulnerabilities for security breaches such as …

Hardware security for just-in-time compilation in language virtual machines

Q Ducasse - 2024 - theses.hal.science
Language Virtual Machines (VMs) are the run-time environment of popular high level
managed languages. They offer portability and memory handling for the developer and are …

Efficient sealable protection keys for RISC-V

L Delshadtehrani, S Canakci, M Egele… - arxiv preprint arxiv …, 2020 - arxiv.org
With the continuous increase in the number of software-based attacks, there has been a
growing effort towards isolating sensitive data and trusted software components from …

Towards efficient control-flow attestation with software-assisted multi-level execution tracing

D Papamartzivanos, SA Menesidou… - 2021 IEEE …, 2021 - ieeexplore.ieee.org
In the face of an increasing attack landscape, it is necessary to cater for efficient
mechanisms to verify software and device integrity for detecting run-time modifications in …

Hardware-Assisted Packed Malware Analysis

E Leal - 2024 - search.proquest.com
Malware, a combination of the words" malicious software," is a formidable adversary in the
ever-evolving landscape of cybersecurity. It encompasses a wide array of harmful software …