Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Sok: History is a vast early warning system: Auditing the provenance of system intrusions
Auditing, a central pillar of operating system security, has only recently come into its own as
an active area of public research. This resurgent interest is due in large part to the notion of …
an active area of public research. This resurgent interest is due in large part to the notion of …
Scalability, fidelity and stealth in the DRAKVUF dynamic malware analysis system
Malware is one of the biggest security threats on the Internet today and deploying effective
defensive solutions requires the rapid analysis of a continuously increasing number of …
defensive solutions requires the rapid analysis of a continuously increasing number of …
Who watches the watchmen: A security-focused review on current state-of-the-art techniques, tools, and methods for systems and binary analysis on modern platforms
Malicious software, a threat users face on a daily basis, have evolved from simple bankers
based on social engineering to advanced persistent threats. Recent research and …
based on social engineering to advanced persistent threats. Recent research and …
Detecting hardware-assisted virtualization
Virtualization has become an indispensable technique for scaling up the analysis of
malicious code, such as for malware analysis or shellcode detection systems. Frameworks …
malicious code, such as for malware analysis or shellcode detection systems. Frameworks …
{00SEVen}–Re-enabling Virtual Machine Forensics: Introspecting Confidential {VMs} Using Privileged {in-VM} Agents
The security guarantees of confidential VMs (eg, AMD's SEV) are a double-edged sword:
Their protection against undesired VM inspection by malicious or compromised cloud …
Their protection against undesired VM inspection by malicious or compromised cloud …
The other guys: automated analysis of marginalized malware
In order to thwart dynamic analysis and bypass protection mechanisms, malware have been
using several file formats and evasive techniques. While publicly available dynamic …
using several file formats and evasive techniques. While publicly available dynamic …
RapidVMI: Fast and multi-core aware active virtual machine introspection
Virtual machine introspection (VMI) is a technique for the external monitoring of virtual
machines. Through previous work, it became apparent that VMI can contribute to the security …
machines. Through previous work, it became apparent that VMI can contribute to the security …
Hardware-assisted MMU redirection for in-guest monitoring and API profiling
With the advance of hardware, network, and virtualization technologies, cloud computing
has prevailed and become the target of security threats such as the cross virtual machine …
has prevailed and become the target of security threats such as the cross virtual machine …
Api chaser: Taint-assisted sandbox for evasive malware analysis
We propose a design and implementation for an Application Programming Interface (API)
monitoring system called API Chaser, which is resistant to evasion-type anti-analysis …
monitoring system called API Chaser, which is resistant to evasion-type anti-analysis …
{HyperLeech}: Stealthy System Virtualization with Minimal Target Impact through {DMA-Based} Hypervisor Injection
In the recent past, malware began to incorporate anti-forensic techniques in order to hinder
analysts from gaining meaningful results. Consequently, methods that allow the stealthy …
analysts from gaining meaningful results. Consequently, methods that allow the stealthy …