[图书][B] IT-Sicherheit: Konzepte–Verfahren–Protokolle

C Eckert - 2013 - degruyter.com
Literaturverzeichnis Page 1 Literaturverzeichnis [1] 3GPP. Design of the UMTS Cipher and
Integrity Functions. [2] 3GPP. UMTS Security Architecture. [3] Martın Abadi and Roger M …

Exploring the design space of page management for {Multi-Tiered} memory systems

J Kim, W Choe, J Ahn - … Annual Technical Conference (USENIX ATC 21), 2021 - usenix.org
With the arrival of tiered memory systems comprising various types of memory, such as
DRAM and SCM, the operating system support for memory management is becoming …

Federated TON_IoT Windows datasets for evaluating AI-based security applications

N Moustafa, M Keshky, E Debiez… - 2020 IEEE 19th …, 2020 - ieeexplore.ieee.org
Existing cyber security solutions have been basically developed using knowledge-based
models that often cannot trigger new cyber-attack families. With the boom of Artificial …

Rapid prototyping for microarchitectural attacks

C Easdon, M Schwarz, M Schwarzl… - 31st USENIX Security …, 2022 - usenix.org
In recent years, microarchitectural attacks have been demonstrated to be a powerful attack
class. However, as our empirical analysis shows, there are numerous implementation …

[HTML][HTML] Optimization of code caves in malware binaries to evade machine learning detectors

J Yuste, EG Pardo, J Tapiador - Computers & Security, 2022 - Elsevier
Abstract Machine Learning (ML) techniques, especially Artificial Neural Networks, have
been widely adopted as a tool for malware detection due to their high accuracy when …

Iron: Isolating network-based {CPU} in container environments

J Khalid, E Rozner, W Felter, C Xu… - … USENIX Symposium on …, 2018 - usenix.org
Containers are quickly increasing in popularity as the mechanism to deploy computation in
the cloud. In order to provide consistent and reliable performance, cloud providers must …

You are your friends: Detecting malware via guilt-by-association and exempt-by-reputation

P Najafi, W Puenter, F Cheng, C Meinel - Computers & Security, 2024 - Elsevier
With the increase in the prevalence of Security Information and Event Management Systems
(SIEMs) in today's organizations, there is a growing interest in data-driven threat detection …

Resurrecting anti-virtualization and anti-debugging: Unhooking your hooks

T Apostolopoulos, V Katos, KKR Choo… - Future Generation …, 2021 - Elsevier
Dynamic malware analysis involves the debugging of the associated binary files and the
monitoring of changes in sandboxed environments. This allows the investigator to …

[HTML][HTML] Windows memory forensics: Detecting (un) intentionally hidden injected code by examining page table entries

F Block, A Dewald - Digital Investigation, 2019 - Elsevier
Malware utilizes code injection techniques to either manipulate other processes (eg done by
banking trojans) or hide its existence. With some exceptions, such as ROP gadgets, the …

Defense and attack techniques against file-based TOCTOU vulnerabilities: A systematic review

R Raducu, RJ Rodríguez, P Álvarez - IEEE Access, 2022 - ieeexplore.ieee.org
File-based Time-of-Check to Time-of-Use (TOCTOU) race conditions are a well-known type
of security vulnerability. A wide variety of techniques have been proposed to detect, mitigate …