Radmin: early detection of application-level resource exhaustion and starvation attacks

M Elsabagh, D Barbará, D Fleck, A Stavrou - Research in Attacks …, 2015 - Springer
Software systems are often engineered and tested for functionality under normal rather than
worst-case conditions. This makes the systems vulnerable to denial of service attacks, where …

On early detection of application-level resource exhaustion and starvation

M Elsabagh, D Barbará, D Fleck, A Stavrou - Journal of Systems and …, 2018 - Elsevier
Software systems are often engineered and tested for functionality under normal rather than
worst-case conditions. This makes the systems vulnerable to denial-of-service attacks …

Acquirer: A Hybrid Approach to Detecting Algorithmic Complexity Vulnerabilities

Y Liu, W Meng - Proceedings of the 2022 ACM SIGSAC Conference on …, 2022 - dl.acm.org
Algorithmic Complexity (AC) Denial-of-Service attacks have been a threat for over twenty
years. Attackers craft particular input vectors to trigger the worst-case logic of some code …

Practical and accurate runtime application protection against dos attacks

M Elsabagh, D Fleck, A Stavrou, M Kaplan… - … Symposium on Research …, 2017 - Springer
Abstract Software Denial-of-Service (DoS) attacks use maliciously crafted inputs aiming to
exhaust available resources of the target software. These application-level DoS attacks have …

Security breaches as PMU deviation: detecting and identifying security attacks using performance counters

L Yuan, W Xing, H Chen, B Zang - … of the Second Asia-Pacific Workshop …, 2011 - dl.acm.org
This paper considers and validates the applicability of leveraging pervasively-available
performance counters for detecting and reasoning about security breaches. Our key …

Martini: Memory access traces to detect attacks

Y Qin, S Gonzalez, K Angstadt, X Wang… - Proceedings of the …, 2020 - dl.acm.org
Hardware architectural vulnerabilities, such as Spectre and Meltdown, are difficult or
inefficient to mitigate in software. Although revised hardware designs may address some …

Dangzero: Efficient use-after-free detection via direct page table access

F Gorter, K Koning, H Bos, C Giuffrida - Proceedings of the 2022 ACM …, 2022 - dl.acm.org
Use-after-free vulnerabilities remain difficult to detect and mitigate, making them a popular
source of exploitation. Existing solutions incur impractical performance/memory overhead …

Coda: Runtime Detection of Application-Layer CPU-Exhaustion DoS Attacks in Containers

M Zhan, Y Li, H Yang, G Yu, B Li… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Denial of service (DoS) attacks have increasingly exploited vulnerabilities in algorithms or
implementation methods in application-layer programs. In this type of attack, called CPU …

EPA-RIMM: An Efficient, Performance-Aware Runtime Integrity Measurement Mechanism for Modern Server Platforms

B Delgado, T Vibhute, J Fastabend… - 2019 49th Annual …, 2019 - ieeexplore.ieee.org
Detecting unexpected changes in a system's runtime environment is critical to resilience. A
repurposing of System Management Mode (SMM) for runtime security inspections has been …

[PDF][PDF] A2c: Self destructing exploit executions via input perturbation

Y Kwon, B Saltaformaggio, IL Kim… - Proceedings of The …, 2017 - friends.cs.purdue.edu
Malicious payload injection attacks have been a serious threat to software for decades.
Unfortunately, protection against these attacks remains challenging due to the ever …