Unicorn: Runtime provenance-based detector for advanced persistent threats
Advanced Persistent Threats (APTs) are difficult to detect due to their" low-and-slow" attack
patterns and frequent use of zero-day exploits. We present UNICORN, an anomaly-based …
patterns and frequent use of zero-day exploits. We present UNICORN, an anomaly-based …
An android application sandbox system for suspicious software detection
T Bläsing, L Batyuk, AD Schmidt… - … on Malicious and …, 2010 - ieeexplore.ieee.org
Smartphones are steadily gaining popularity, creating new application areas as their
capabilities increase in terms of computational power, sensors and communication …
capabilities increase in terms of computational power, sensors and communication …
Iago attacks: Why the system call API is a bad untrusted RPC interface
In recent years, researchers have proposed systems for running trusted code on an
untrusted operating system. Protection mechanisms deployed by such systems keep a …
untrusted operating system. Protection mechanisms deployed by such systems keep a …
Countering code-injection attacks with instruction-set randomization
We describe a new, general approach for safeguarding systems against any type of code-
injection attack. We apply Kerckhoff's principle, by creating process-specific randomized …
injection attack. We apply Kerckhoff's principle, by creating process-specific randomized …
Dune: Safe user-level access to privileged {CPU} features
Dune is a system that provides applications with direct but safe access to hardware features
such as ring protection, page tables, and tagged TLBs, while preserving the existing OS …
such as ring protection, page tables, and tagged TLBs, while preserving the existing OS …
SQLrand: Preventing SQL injection attacks
SW Boyd, AD Keromytis - … , ACNS 2004, Yellow Mountain, China, June 8 …, 2004 - Springer
We present a practical protection mechanism against SQL injection attacks. Such attacks
target databases that are accessible through a web front-end, and take advantage of flaws in …
target databases that are accessible through a web front-end, and take advantage of flaws in …
[PDF][PDF] Copilot-a Coprocessor-based Kernel Runtime Integrity Monitor.
NL Petroni Jr, T Fraser, J Molina… - USENIX security …, 2004 - jesusmolina.com
Copilot is a coprocessor-based kernel integrity monitor for commodity systems. Copilot is
designed to detect malicious modifications to a host's kernel and has correctly detected the …
designed to detect malicious modifications to a host's kernel and has correctly detected the …
Improving Host Security with System Call Policies.
N Provos - USENIX Security Symposium, 2003 - usenix.org
We introduce a system that eliminates the need to run programs in privileged process
contexts. Using our system, programs run unprivileged but may execute certain operations …
contexts. Using our system, programs run unprivileged but may execute certain operations …
Virtuoso: Narrowing the semantic gap in virtual machine introspection
Introspection has featured prominently in many recent security solutions, such as virtual
machine-based intrusion detection, forensic memory analysis, and low-artifact malware …
machine-based intrusion detection, forensic memory analysis, and low-artifact malware …
Events detection for an audio-based surveillance system
The present research deals with audio events detection in noisy environments for a
multimedia surveillance application. In surveillance or homeland security most of the …
multimedia surveillance application. In surveillance or homeland security most of the …