Windows malware detectors based on machine learning are vulnerable to adversarial examples, even if the attacker is only given black-box query access to the model. The main …
C Pang, R Yu, Y Chen, E Koskinen… - … IEEE symposium on …, 2021 - ieeexplore.ieee.org
Disassembly of binary code is hard, but necessary for improving the security of binary software. Over the past few decades, research in binary disassembly has produced many …
Static binary rewriting has many important applications in software security and systems, such as hardening, repair, patching, instrumentation, and debugging. While many different …
The breakdown of Dennard scaling has resulted in a decade-long stall of the maximum operating clock frequencies of processors. To mitigate this issue, computing shifted to multi …
Coverage-guided fuzzing's aggressive, high-volume testing has helped reveal tens of thousands of software security flaws. While executing billions of test cases mandates fast …
Intel Software Guard eXtension (SGX) is the cornerstone of Confidential Computing, enabling runtime code and data integrity and confidentiality via enclaves. Unfortunately …
M Guri - IEEE Transactions on Dependable and Secure …, 2023 - ieeexplore.ieee.org
Air-gapped systems are isolated from the Internet due to the sensitive information they handle. This paper introduces a covert channel attack that leaks sensitive information over …
E Gustafson, P Grosen, N Redini, S Jha… - Proceedings of the 26th …, 2023 - dl.acm.org
In today's era of the Internet of Things, we are surrounded by security-and safety-critical, network-connected devices. In parallel with the rise in attacks on such devices, we have also …
ARM binary analysis has a wide range of applications in ARM system security. A fundamental challenge is ARM disassembly. ARM, particularly AArch32, has a number of …