On the feasibility of online malware detection with performance counters J Demme, M Maycock, J Schmitz, A Tang, A Waksman, S Sethumadhavan, ... ACM SIGARCH Computer Architecture News 41 (3), 559-570, 2013 | 599 | 2013 |
CLKSCREW: Exposing the Perils of Security-Oblivious Energy Management A Tang, S Sethumadhavan, S Stolfo | 357 | 2017 |
Unsupervised anomaly-based malware detection using hardware features A Tang, S Sethumadhavan, SJ Stolfo International Workshop on Recent Advances in Intrusion Detection, 109-129, 2014 | 345 | 2014 |
NEZHA: Efficient Domain-Independent Differential Testing T Petsios, A Tang, S Stolfo, AD Keromytis, S Jana Proceedings of the 38th IEEE Symposium on Security & Privacy,(San Jose, CA), 2017 | 151 | 2017 |
Heisenbyte: Thwarting memory disclosure attacks using destructive code reads A Tang, S Sethumadhavan, S Stolfo Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015 | 131 | 2015 |
AVIVA: a health and fitness monitor for young women R Gockley, M Marotta, C Rogoff, A Tang CHI'06 Extended Abstracts on Human Factors in Computing Systems, 1819-1824, 2006 | 27 | 2006 |
Confuse: LLVM-based Code Obfuscation CF Chen, T Petsios, M Pomonis, A Tang May, 2013 | 12 | 2013 |
Blacklist Core: Machine-Learning Based Dynamic Operating-Performance-Point Blacklisting for Mitigating Power-Management Security Attacks S Zhang, A Tang, Z Jiang, S Sethumadhavan, M Seok Proceedings of the International Symposium on Low Power Electronics and …, 2018 | 11 | 2018 |
Motivating Security-Aware Energy Management A Tang, S Sethumadhavan, S Stolfo IEEE Micro 38 (3), 98-106, 2018 | 8 | 2018 |
Empowering ordinary consumers to securely configure their mobile devices and wireless networks C Kuo, V Goh, A Tang, A Perrig, J Walker CyLab, 65, 2005 | 7 | 2005 |
Unsupervised detection of anomalous processes using hardware features S Lakshminarasimhan, A Tang, S Stolfo US Patent US9996694B2, 2018 | | 2018 |
Tug-of-War: Observations on Unified Content Handling T Petsios, A Tang, D Mitropoulos, S Stolfo, AD Keromytis, S Jana arXiv preprint arXiv:1708.09334, 2017 | | 2017 |
A silicon anti-virus engine. A Tang, J Demme, S Sethumadhavan, SJ Stolfo Hot Chips Symposium, 1, 2015 | | 2015 |
Anti-Virus in Silicon A Tang, J Demme, S Sethumadhavan, S Stolfo | | 2015 |
Design and Evaluation Method for Secure 802.11 Network Configuration C Kuo, V Goh, A Tang | | 2005 |