On the feasibility of malware unpacking via hardware-assisted loop profiling
Hardware Performance Counters (HPCs) are built-in registers of modern processors to
count the occurrences of various micro-architectural events. Measuring HPCs values is a …
count the occurrences of various micro-architectural events. Measuring HPCs values is a …
[PDF][PDF] A cautionary tale about detecting malware using hardware performance counters and machine learning
Electrical and Computer Engineering Department, Boston University, Boston, MA 02215
USA the program's behavior. As software-level behavioral analysis performs malware …
USA the program's behavior. As software-level behavioral analysis performs malware …
Terminator: A Secure Coprocessor to Accelerate Real-Time AntiViruses Using Inspection Breakpoints
AntiViruses (AVs) are essential to face the myriad of malware threatening Internet users. AVs
operate in two modes: on-demand checks and real-time verification. Software-based real …
operate in two modes: on-demand checks and real-time verification. Software-based real …
Sealpk: Sealable protection keys for risc-v
With the continuous increase in the number of software-based attacks, there has been a
growing effort towards isolating sensitive data and trusted software components from …
growing effort towards isolating sensitive data and trusted software components from …
MazeRunner: evaluating the attack surface of control-flow integrity policies
Control-Flow Integrity (CFI) enforces a control-flow graph (CFG) to limit attackers' ability to
manipulate runtime control flow. CFI variations, enforcing different CFGs, achieve different …
manipulate runtime control flow. CFI variations, enforcing different CFGs, achieve different …
Pythia: Compiler-Guided Defense Against Non-Control Data Attacks
Modern C/C++ applications are susceptible to Non-Control Data Attacks, where an
adversary attempts to exploit memory corruption vulnerabilities for security breaches such as …
adversary attempts to exploit memory corruption vulnerabilities for security breaches such as …
Hardware security for just-in-time compilation in language virtual machines
Q Ducasse - 2024 - theses.hal.science
Language Virtual Machines (VMs) are the run-time environment of popular high level
managed languages. They offer portability and memory handling for the developer and are …
managed languages. They offer portability and memory handling for the developer and are …
Efficient sealable protection keys for RISC-V
With the continuous increase in the number of software-based attacks, there has been a
growing effort towards isolating sensitive data and trusted software components from …
growing effort towards isolating sensitive data and trusted software components from …
Towards efficient control-flow attestation with software-assisted multi-level execution tracing
D Papamartzivanos, SA Menesidou… - 2021 IEEE …, 2021 - ieeexplore.ieee.org
In the face of an increasing attack landscape, it is necessary to cater for efficient
mechanisms to verify software and device integrity for detecting run-time modifications in …
mechanisms to verify software and device integrity for detecting run-time modifications in …
Hardware-Assisted Packed Malware Analysis
E Leal - 2024 - search.proquest.com
Malware, a combination of the words" malicious software," is a formidable adversary in the
ever-evolving landscape of cybersecurity. It encompasses a wide array of harmful software …
ever-evolving landscape of cybersecurity. It encompasses a wide array of harmful software …