Malicious firmware detection with hardware performance counters

X Wang, C Konstantinou, M Maniatakos… - … on Multi-Scale …, 2016 - ieeexplore.ieee.org
Critical infrastructure components nowadays use microprocessor-based embedded control
systems. It is often infeasible, however, to employ the same level of security measures used …

SIGDROP: Signature-based ROP detection using hardware performance counters

X Wang, J Backer - arXiv preprint arXiv:1609.02667, 2016 - arxiv.org
Return-Oriented Programming (ROP) is a software exploit for system compromise. By
chaining short instruction sequences from existing code pieces, ROP can bypass static code …

[图书][B] Impact of virtualization on cloud network security

K Sundar - 2016 - search.proquest.com
In this thesis, experimental evaluation of the effect of virtualization on the availability of
servers has been performed under Distributed Denial of Service (DDoS) attacks for popular …

[引用][C] Malicious Firmware Detection with Hardware Performance Counters

P Robison, P Stergiou, S Kim - 2016