Event prediction in the big data era: A systematic survey
L Zhao - ACM Computing Surveys (CSUR), 2021 - dl.acm.org
Events are occurrences in specific locations, time, and semantics that nontrivially impact
either our society or the nature, such as earthquakes, civil unrest, system failures …
either our society or the nature, such as earthquakes, civil unrest, system failures …
A survey of bit-flip attacks on deep neural network and corresponding defense methods
C Qian, M Zhang, Y Nie, S Lu, H Cao - Electronics, 2023 - mdpi.com
As the machine learning-related technology has made great progress in recent years, deep
neural networks are widely used in many scenarios, including security-critical ones, which …
neural networks are widely used in many scenarios, including security-critical ones, which …
Signature correction attack on dilithium signature scheme
Motivated by the rise of quantum computers, existing public-key cryptosystems are expected
to be replaced by post-quantum schemes in the next decade in billions of devices. To …
to be replaced by post-quantum schemes in the next decade in billions of devices. To …
Real-time detection for cache side channel attack using performance counter monitor
Cache side channel attacks extract secret information by monitoring the cache behavior of a
victim. Normally, this attack targets an L3 cache, which is shared between a spy and a victim …
victim. Normally, this attack targets an L3 cache, which is shared between a spy and a victim …
Explainable machine learning for intrusion detection via hardware performance counters
The exponential proliferation of Malware over the past decade has threatened system
security across a plethora of Internet of Things (IoT) devices. Furthermore, the improvements …
security across a plethora of Internet of Things (IoT) devices. Furthermore, the improvements …
Machine learning-based Rowhammer mitigation
BK Joardar, TK Bletsch… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Rowhammer is a security vulnerability that arises due to the undesirable electrical
interaction between physically adjacent rows in DRAMs. Bit flips caused by Rowhammer …
interaction between physically adjacent rows in DRAMs. Bit flips caused by Rowhammer …
Robust and scalable process isolation against spectre in the cloud
In the quest for efficiency and performance, edge-computing providers replace process
isolation with sandboxes, to support a high number of tenants per machine. While secure …
isolation with sandboxes, to support a high number of tenants per machine. While secure …
Learning to mitigate rowhammer attacks
BK Joardar, TK Bletsch… - 2022 Design, Automation …, 2022 - ieeexplore.ieee.org
Rowhammer is a vulnerability that arises due to the undesirable interaction between
physically adjacent rows in DRAMs. Existing DRAM protections are not adequate to defend …
physically adjacent rows in DRAMs. Existing DRAM protections are not adequate to defend …
{ClepsydraCache}--Preventing Cache Attacks with {Time-Based} Evictions
In the recent past, we have witnessed the shift towards attacks on the microarchitectural
CPU level. In particular, cache side-channels play a predominant role as they allow an …
CPU level. In particular, cache side-channels play a predominant role as they allow an …
Perspectron: Detecting invariant footprints of microarchitectural attacks with perceptron
S Mirbagher-Ajorpaz, G Pokam… - 2020 53rd Annual …, 2020 - ieeexplore.ieee.org
Detecting microarchitectural attacks is critical given their proliferation in recent years. Many
of these attacks exhibit intrinsic behaviors essential to the nature of their operation, such as …
of these attacks exhibit intrinsic behaviors essential to the nature of their operation, such as …