Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Unicorn: Runtime provenance-based detector for advanced persistent threats
Advanced Persistent Threats (APTs) are difficult to detect due to their" low-and-slow" attack
patterns and frequent use of zero-day exploits. We present UNICORN, an anomaly-based …
patterns and frequent use of zero-day exploits. We present UNICORN, an anomaly-based …
An android application sandbox system for suspicious software detection
T Bläsing, L Batyuk, AD Schmidt… - … on Malicious and …, 2010 - ieeexplore.ieee.org
Smartphones are steadily gaining popularity, creating new application areas as their
capabilities increase in terms of computational power, sensors and communication …
capabilities increase in terms of computational power, sensors and communication …
Iago attacks: Why the system call API is a bad untrusted RPC interface
In recent years, researchers have proposed systems for running trusted code on an
untrusted operating system. Protection mechanisms deployed by such systems keep a …
untrusted operating system. Protection mechanisms deployed by such systems keep a …
Donky: Domain keys–efficient {In-Process} isolation for {RISC-V} and x86
D Schrammel, S Weiser, S Steinegger… - 29th USENIX Security …, 2020 - usenix.org
Efficient and secure in-process isolation is in great demand, as evidenced in the shift
towards JavaScript and the recent revival of memory protection keys. Yet, state-of-the-art …
towards JavaScript and the recent revival of memory protection keys. Yet, state-of-the-art …
Dune: Safe user-level access to privileged {CPU} features
Dune is a system that provides applications with direct but safe access to hardware features
such as ring protection, page tables, and tagged TLBs, while preserving the existing OS …
such as ring protection, page tables, and tagged TLBs, while preserving the existing OS …
Countering code-injection attacks with instruction-set randomization
We describe a new, general approach for safeguarding systems against any type of code-
injection attack. We apply Kerckhoff's principle, by creating process-specific randomized …
injection attack. We apply Kerckhoff's principle, by creating process-specific randomized …
SQLrand: Preventing SQL injection attacks
SW Boyd, AD Keromytis - … , ACNS 2004, Yellow Mountain, China, June 8 …, 2004 - Springer
We present a practical protection mechanism against SQL injection attacks. Such attacks
target databases that are accessible through a web front-end, and take advantage of flaws in …
target databases that are accessible through a web front-end, and take advantage of flaws in …
[PDF][PDF] Copilot-a Coprocessor-based Kernel Runtime Integrity Monitor.
NL Petroni Jr, T Fraser, J Molina… - USENIX security …, 2004 - jesusmolina.com
Copilot is a coprocessor-based kernel integrity monitor for commodity systems. Copilot is
designed to detect malicious modifications to a host's kernel and has correctly detected the …
designed to detect malicious modifications to a host's kernel and has correctly detected the …
Jenny: Securing syscalls for {PKU-based} memory isolation systems
D Schrammel, S Weiser, R Sadek… - 31st USENIX Security …, 2022 - usenix.org
Effective syscall filtering is a key component for withstanding the numerous exploitation
techniques and privilege escalation attacks we face today. For example, modern browsers …
techniques and privilege escalation attacks we face today. For example, modern browsers …
Improving host security with system call policies.
N Provos - USENIX Security Symposium, 2003 - usenix.org
We introduce a system that eliminates the need to run programs in privileged process
contexts. Using our system, programs run unprivileged but may execute certain operations …
contexts. Using our system, programs run unprivileged but may execute certain operations …