[HTML][HTML] Flash controller-based secure execution environment for protecting code confidentiality
Z Zhang, J Xue, T Chen, Y Zhao, W Meng - Journal of Systems Architecture, 2024 - Elsevier
With the rapid evolution of Internet-of-Things (IoT), billions of IoT devices have connected to
the Internet, collecting information via tags and sensors. For an IoT device, the application …
the Internet, collecting information via tags and sensors. For an IoT device, the application …
Detecting unknown vulnerabilities in smart contracts using opcode sequences
Unknown vulnerabilities, also known as zero-day vulnerabilities, are vulnerabilities in
software, systems, or networks that have not yet been publicly disclosed or fixed. If these …
software, systems, or networks that have not yet been publicly disclosed or fixed. If these …
Bi-thresholds-based unknown vulnerability detection in smart contracts using multi-classification model
P Li, G Wang, G Zhai, W Gu, X Li, X Liu… - Computers and Electrical …, 2024 - Elsevier
Ethereum's development has established a trusted environment for executing smart
contracts. However, smart contracts often involve significant financial transfers and become …
contracts. However, smart contracts often involve significant financial transfers and become …
Detecting unknown vulnerabilities in smart contracts with binary classification model using machine learning
The emergence of smart contracts has led to the wider use of blockchain, which involves a
large number of virtual currency transactions. Because smart contracts are inevitably written …
large number of virtual currency transactions. Because smart contracts are inevitably written …
FedTA: Locally-Differential Federated Learning with Top-k Mechanism and Adam Optimization
Y Li, G Wang, T Peng, G Feng - International Conference on Ubiquitous …, 2022 - Springer
With the explosive development of fields including big data and cloud computing, it has
become a global trend for the public to place a premium on data security and privacy. A …
become a global trend for the public to place a premium on data security and privacy. A …
A survey on the evolution of bootkits attack and defense techniques
Y Zhou, G Peng, Z Li, S Liu - China Communications, 2024 - ieeexplore.ieee.org
According to the boot process of modern computer systems, whoever boots first will gain
control first. Taking advantage of this feature, a malicious code called bootkit can hijack the …
control first. Taking advantage of this feature, a malicious code called bootkit can hijack the …
Detecting unknown vulnerabilities in smart contracts with multi-label classification model using CNN-BiLSTM
W Gu, G Wang, P Li, X Li, G Zhai, X Li… - … Conference on Ubiquitous …, 2022 - Springer
Smart contracts are frequently targeted by hackers because they hold large amounts of
money and cannot be modified once they are published. Existing detection methods mainly …
money and cannot be modified once they are published. Existing detection methods mainly …
Towards isolated execution at the machine level
Isolated execution with CPU-level protection, such as process sandboxes, virtual machines,
and trusted execution environments, has long been studied to mitigate software …
and trusted execution environments, has long been studied to mitigate software …
Research on Dynamic Detection of Vulnerabilities in Smart Contracts Based on Machine Learning
Y Boxin - 2024 IEEE 3rd International Conference on Electrical …, 2024 - ieeexplore.ieee.org
The proliferation of smart contracts has led to a surge in hacking attacks, resulting in
substantial financial losses and undermining the healthy growth of the blockchain …
substantial financial losses and undermining the healthy growth of the blockchain …
FMC-CEE: A Collaborative Execution Environment with Flash Memory Controllers in IoT
Z Zhang, J Xue, T Baker, T Chen… - … Workshops and other …, 2024 - ieeexplore.ieee.org
Applications running on an Internet of Things (IoT) device are usually deployed in an
untrusted environment. This introduces risks of vulnerability to malware, and loss of …
untrusted environment. This introduces risks of vulnerability to malware, and loss of …