Event prediction in the big data era: A systematic survey

L Zhao - ACM Computing Surveys (CSUR), 2021 - dl.acm.org
Events are occurrences in specific locations, time, and semantics that nontrivially impact
either our society or the nature, such as earthquakes, civil unrest, system failures …

A survey of bit-flip attacks on deep neural network and corresponding defense methods

C Qian, M Zhang, Y Nie, S Lu, H Cao - Electronics, 2023 - mdpi.com
As the machine learning-related technology has made great progress in recent years, deep
neural networks are widely used in many scenarios, including security-critical ones, which …

Signature correction attack on dilithium signature scheme

S Islam, K Mus, R Singh, P Schaumont… - 2022 IEEE 7th …, 2022 - ieeexplore.ieee.org
Motivated by the rise of quantum computers, existing public-key cryptosystems are expected
to be replaced by post-quantum schemes in the next decade in billions of devices. To …

Real-time detection for cache side channel attack using performance counter monitor

J Cho, T Kim, S Kim, M Im, T Kim, Y Shin - Applied Sciences, 2020 - mdpi.com
Cache side channel attacks extract secret information by monitoring the cache behavior of a
victim. Normally, this attack targets an L3 cache, which is shared between a spy and a victim …

Explainable machine learning for intrusion detection via hardware performance counters

AP Kuruvila, X Meng, S Kundu… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
The exponential proliferation of Malware over the past decade has threatened system
security across a plethora of Internet of Things (IoT) devices. Furthermore, the improvements …

Machine learning-based Rowhammer mitigation

BK Joardar, TK Bletsch… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Rowhammer is a security vulnerability that arises due to the undesirable electrical
interaction between physically adjacent rows in DRAMs. Bit flips caused by Rowhammer …

Robust and scalable process isolation against spectre in the cloud

M Schwarzl, P Borrello, A Kogler, K Varda… - … on Research in …, 2022 - Springer
In the quest for efficiency and performance, edge-computing providers replace process
isolation with sandboxes, to support a high number of tenants per machine. While secure …

Learning to mitigate rowhammer attacks

BK Joardar, TK Bletsch… - 2022 Design, Automation …, 2022 - ieeexplore.ieee.org
Rowhammer is a vulnerability that arises due to the undesirable interaction between
physically adjacent rows in DRAMs. Existing DRAM protections are not adequate to defend …

{ClepsydraCache}--Preventing Cache Attacks with {Time-Based} Evictions

JP Thoma, C Niesler, D Funke, G Leander… - 32nd USENIX Security …, 2023 - usenix.org
In the recent past, we have witnessed the shift towards attacks on the microarchitectural
CPU level. In particular, cache side-channels play a predominant role as they allow an …

Perspectron: Detecting invariant footprints of microarchitectural attacks with perceptron

S Mirbagher-Ajorpaz, G Pokam… - 2020 53rd Annual …, 2020 - ieeexplore.ieee.org
Detecting microarchitectural attacks is critical given their proliferation in recent years. Many
of these attacks exhibit intrinsic behaviors essential to the nature of their operation, such as …