Exploring branch predictors for constructing transient execution trojans
T Zhang, K Koltermann, D Evtyushkin - Proceedings of the Twenty-Fifth …, 2020 - dl.acm.org
Transient execution is one of the most critical features used in CPUs to achieve high
performance. Recent Spectre attacks demonstrated how this feature can be manipulated to …
performance. Recent Spectre attacks demonstrated how this feature can be manipulated to …
Fast attack detection system using log analysis and attack tree generation
D Kim, YH Kim, D Shin, D Shin - Cluster Computing, 2019 - Springer
Many government branches report that internal networks are managed safely by separating
them from the outside, but there is often a vulnerability that allows malicious codes to attack …
them from the outside, but there is often a vulnerability that allows malicious codes to attack …
[PDF][PDF] 无文件系统嵌入式固件后门检测
忽朝俭, 薛一波, 赵粮, 李舟军 - 通信学报, 2013 - infocomm-journal.com
在无文件系统嵌入式固件中, 系统代码和应用代码集成在单个文件中, 无法看到熟悉的系统调用
名字, 故针对此类固件的分析将更为困难. 以此类固件为研究对象, 分析了其中的库函数识别问题 …
名字, 故针对此类固件的分析将更为困难. 以此类固件为研究对象, 分析了其中的库函数识别问题 …
Debiasing backdoor attack: A benign application of backdoor attack in eliminating data bias
Backdoor attack which carries out a threat to model training has received increasing
attention in recent years. Reviewing the previous research on adversarial attacks posing risk …
attention in recent years. Reviewing the previous research on adversarial attacks posing risk …
AI-Powered Detection and Mitigation of Backdoor Attacks on Databases Server
A malicious act known as a backdoor attack occurs when an attacker takes advantage of
system weaknesses in order to obtain unauthorized access. This requires modifying the …
system weaknesses in order to obtain unauthorized access. This requires modifying the …
Bounding the number of linear regions in local area for neural networks with relu activations
The number of linear regions is one of the distinct properties of the neural networks using
piecewise linear activation functions such as ReLU, comparing with those conventional …
piecewise linear activation functions such as ReLU, comparing with those conventional …
Two-step hierarchical scheme for detecting detoured attacks to the web server
B Choi, K Cho - Computer Science and Information Systems, 2013 - doiserbia.nb.rs
In this paper, we propose an improved detection scheme to protect a Web server from
detoured attacks, which disclose confidential/private information or disseminate malware …
detoured attacks, which disclose confidential/private information or disseminate malware …
Exploring Transient Execution Vulnerabilities, Side-Channel Attacks, and Defenses
T Zhang - 2024 - search.proquest.com
Modern microprocessors utilize branch prediction and speculative execution to enhance
instruction throughput. Instead of stalling the pipeline and waiting for branch targets to be …
instruction throughput. Instead of stalling the pipeline and waiting for branch targets to be …
[PDF][PDF] Determining the number of hidden neurons in a multi layer feed forward neural network
L Ray - Journal of Information Security Research, 2013 - dline.info
A neural network intrusion detection system (IDS) can be effective against network attacks.
However, their effectiveness can be reduced by changes in the neural network architecture …
However, their effectiveness can be reduced by changes in the neural network architecture …
Backdoor Detection Based on Static Code Analysis and Software Component Analysis
G Yue, H Xiao, J Chen - Proceedings of the 2023 3rd International …, 2023 - dl.acm.org
With the popularity of software in daily life and commercial fields, it has become particularly
critical to ensure software security. As one of the potential security threats, software …
critical to ensure software security. As one of the potential security threats, software …