Unicorn: Runtime provenance-based detector for advanced persistent threats

X Han, T Pasquier, A Bates, J Mickens… - arxiv preprint arxiv …, 2020 - arxiv.org
Advanced Persistent Threats (APTs) are difficult to detect due to their" low-and-slow" attack
patterns and frequent use of zero-day exploits. We present UNICORN, an anomaly-based …

An android application sandbox system for suspicious software detection

T Bläsing, L Batyuk, AD Schmidt… - … on Malicious and …, 2010 - ieeexplore.ieee.org
Smartphones are steadily gaining popularity, creating new application areas as their
capabilities increase in terms of computational power, sensors and communication …

Iago attacks: Why the system call API is a bad untrusted RPC interface

S Checkoway, H Shacham - ACM SIGARCH Computer Architecture …, 2013 - dl.acm.org
In recent years, researchers have proposed systems for running trusted code on an
untrusted operating system. Protection mechanisms deployed by such systems keep a …

Countering code-injection attacks with instruction-set randomization

GS Kc, AD Keromytis, V Prevelakis - … of the 10th ACM conference on …, 2003 - dl.acm.org
We describe a new, general approach for safeguarding systems against any type of code-
injection attack. We apply Kerckhoff's principle, by creating process-specific randomized …

Dune: Safe user-level access to privileged {CPU} features

A Belay, A Bittau, A Mashtizadeh, D Terei… - … USENIX Symposium on …, 2012 - usenix.org
Dune is a system that provides applications with direct but safe access to hardware features
such as ring protection, page tables, and tagged TLBs, while preserving the existing OS …

SQLrand: Preventing SQL injection attacks

SW Boyd, AD Keromytis - … , ACNS 2004, Yellow Mountain, China, June 8 …, 2004 - Springer
We present a practical protection mechanism against SQL injection attacks. Such attacks
target databases that are accessible through a web front-end, and take advantage of flaws in …

[PDF][PDF] Copilot-a Coprocessor-based Kernel Runtime Integrity Monitor.

NL Petroni Jr, T Fraser, J Molina… - USENIX security …, 2004 - jesusmolina.com
Copilot is a coprocessor-based kernel integrity monitor for commodity systems. Copilot is
designed to detect malicious modifications to a host's kernel and has correctly detected the …

Improving Host Security with System Call Policies.

N Provos - USENIX Security Symposium, 2003 - usenix.org
We introduce a system that eliminates the need to run programs in privileged process
contexts. Using our system, programs run unprivileged but may execute certain operations …

Virtuoso: Narrowing the semantic gap in virtual machine introspection

B Dolan-Gavitt, T Leek, M Zhivich… - 2011 IEEE symposium …, 2011 - ieeexplore.ieee.org
Introspection has featured prominently in many recent security solutions, such as virtual
machine-based intrusion detection, forensic memory analysis, and low-artifact malware …

Events detection for an audio-based surveillance system

C Clavel, T Ehrette, G Richard - 2005 IEEE International …, 2005 - ieeexplore.ieee.org
The present research deals with audio events detection in noisy environments for a
multimedia surveillance application. In surveillance or homeland security most of the …