Exploring branch predictors for constructing transient execution trojans

T Zhang, K Koltermann, D Evtyushkin - Proceedings of the Twenty-Fifth …, 2020 - dl.acm.org
Transient execution is one of the most critical features used in CPUs to achieve high
performance. Recent Spectre attacks demonstrated how this feature can be manipulated to …

Fast attack detection system using log analysis and attack tree generation

D Kim, YH Kim, D Shin, D Shin - Cluster Computing, 2019 - Springer
Many government branches report that internal networks are managed safely by separating
them from the outside, but there is often a vulnerability that allows malicious codes to attack …

[PDF][PDF] 无文件系统嵌入式固件后门检测

忽朝俭, 薛一波, 赵粮, 李舟军 - 通信学报, 2013 - infocomm-journal.com
在无文件系统嵌入式固件中, 系统代码和应用代码集成在单个文件中, 无法看到熟悉的系统调用
名字, 故针对此类固件的分析将更为困难. 以此类固件为研究对象, 分析了其中的库函数识别问题 …

Debiasing backdoor attack: A benign application of backdoor attack in eliminating data bias

S Wu, Q He, Y Zhang, D Lu, J Sang - Information Sciences, 2023 - Elsevier
Backdoor attack which carries out a threat to model training has received increasing
attention in recent years. Reviewing the previous research on adversarial attacks posing risk …

AI-Powered Detection and Mitigation of Backdoor Attacks on Databases Server

A Khan, I Sharma - … Technologies and Internet of Things (IDCIoT …, 2024 - ieeexplore.ieee.org
A malicious act known as a backdoor attack occurs when an attacker takes advantage of
system weaknesses in order to obtain unauthorized access. This requires modifying the …

Bounding the number of linear regions in local area for neural networks with relu activations

R Zhu, B Lin, H Tang - arXiv preprint arXiv:2007.06803, 2020 - arxiv.org
The number of linear regions is one of the distinct properties of the neural networks using
piecewise linear activation functions such as ReLU, comparing with those conventional …

Two-step hierarchical scheme for detecting detoured attacks to the web server

B Choi, K Cho - Computer Science and Information Systems, 2013 - doiserbia.nb.rs
In this paper, we propose an improved detection scheme to protect a Web server from
detoured attacks, which disclose confidential/private information or disseminate malware …

Exploring Transient Execution Vulnerabilities, Side-Channel Attacks, and Defenses

T Zhang - 2024 - search.proquest.com
Modern microprocessors utilize branch prediction and speculative execution to enhance
instruction throughput. Instead of stalling the pipeline and waiting for branch targets to be …

[PDF][PDF] Determining the number of hidden neurons in a multi layer feed forward neural network

L Ray - Journal of Information Security Research, 2013 - dline.info
A neural network intrusion detection system (IDS) can be effective against network attacks.
However, their effectiveness can be reduced by changes in the neural network architecture …

Backdoor Detection Based on Static Code Analysis and Software Component Analysis

G Yue, H Xiao, J Chen - Proceedings of the 2023 3rd International …, 2023 - dl.acm.org
With the popularity of software in daily life and commercial fields, it has become particularly
critical to ensure software security. As one of the potential security threats, software …