A survey of stealth malware attacks, mitigation measures, and steps toward autonomous open world solutions
As our professional, social, and financial existences become increasingly digitized and as
our government, healthcare, and military infrastructures rely more on computer technologies …
our government, healthcare, and military infrastructures rely more on computer technologies …
Towards making systems forget with machine unlearning
Today's systems produce a rapidly exploding amount of data, and the data further derives
more data, forming a complex data propagation network that we call the data's lineage …
more data, forming a complex data propagation network that we call the data's lineage …
A survey of main memory acquisition and analysis techniques for the windows operating system
S Vömel, FC Freiling - Digital Investigation, 2011 - Elsevier
Traditional, persistent data-oriented approaches in computer forensics face some limitations
regarding a number of technological developments, eg, rapidly increasing storage …
regarding a number of technological developments, eg, rapidly increasing storage …
RowClone: Fast and energy-efficient in-DRAM bulk data copy and initialization
Several system-level operations trigger bulk data copy or initialization. Even though these
bulk data operations do not require any computation, current systems transfer a large …
bulk data operations do not require any computation, current systems transfer a large …
Lest we remember: cold-boot attacks on encryption keys
Contrary to widespread assumption, dynamic RAM (DRAM), the main memory in most
modern computers, retains its contents for several seconds after power is lost, even at room …
modern computers, retains its contents for several seconds after power is lost, even at room …
Automatic Generation of {Data-Oriented} Exploits
As defense solutions against control-flow hijacking attacks gain wide deployment, control-
oriented exploits from memory errors become difficult. As an alternative, attacks targeting …
oriented exploits from memory errors become difficult. As an alternative, attacks targeting …
[PDF][PDF] Vanish: Increasing Data Privacy with Self-Destructing Data.
Today's technical and legal landscape presents formidable challenges to personal data
privacy. First, our increasing reliance on Web services causes personal data to be cached …
privacy. First, our increasing reliance on Web services causes personal data to be cached …
[KSIĄŻKA][B] Usable security: History, themes, and challenges
S Garfinkel, HR Lipford - 2014 - books.google.com
There has been roughly 15 years of research into approaches for aligning research in
Human Computer Interaction with computer Security, more colloquially known as``usable …
Human Computer Interaction with computer Security, more colloquially known as``usable …
[PDF][PDF] Baggy Bounds Checking: An Efficient and Backwards-Compatible Defense against Out-of-Bounds Errors.
Attacks that exploit out-of-bounds errors in C and C++ programs are still prevalent despite
many years of research on bounds checking. Previous backwards compatible bounds …
many years of research on bounds checking. Previous backwards compatible bounds …
Dangsan: Scalable use-after-free detection
Use-after-free vulnerabilities due to dangling pointers are an important and growing threat to
systems security. While various solutions exist to address this problem, none of them is …
systems security. While various solutions exist to address this problem, none of them is …