Exploitation techniques for data-oriented attacks with existing and potential defense approaches

L Cheng, S Ahmed, H Liljestrand, T Nyman… - ACM Transactions on …, 2021 - dl.acm.org
Data-oriented attacks manipulate non-control data to alter a program's benign behavior
without violating its control-flow integrity. It has been shown that such attacks can cause …

Exploitation techniques and defenses for data-oriented attacks

L Cheng, H Liljestrand, MS Ahmed… - 2019 IEEE …, 2019 - ieeexplore.ieee.org
Data-oriented attacks manipulate non-control data to alter a program's benign behavior
without violating its control-flow integrity. It has been shown that such attacks can cause …

Use of Ensemble Learning to Detect Buffer Overflow Exploitation

A Youssef, M Abdelrazek, C Karmakar - IEEE Access, 2023 - ieeexplore.ieee.org
Software exploitation detection remains unresolved problem. Software exploits that target
known and unknown vulnerabilities are constantly used in attacks. Signature-based …

Program Characterization for Software Exploitation Detection

A Youssef, M Abdelrazek, C Karmakar - Proceedings of the 18th …, 2023 - dl.acm.org
Software exploitation is an ever-growing problem. Signature-based exploitation detection
techniques have not been effective as malicious actors continuously develop circumvention …

Leveraging Hardware Performance Counters for Efficient Classification of Binary Packers

E Leal, B Cheng, TQ Nguyen, AG Garcia… - 2023 IEEE 22nd …, 2023 - ieeexplore.ieee.org
The detection and classification of packers serve as a fundamental approach in the study of
malware unpacking. In our research, we employ Hardware Performance Counters (HPCs) …

Detecting non-control-flow hijacking attacks using contextual execution information

G Torres, Z Yang, Z Blasingame, J Bruska… - Proceedings of the 8th …, 2019 - dl.acm.org
In recent years, we see a rise of non-control-flow hijacking attacks, which manipulate key
data elements to corrupt the integrity of a victim application while upholding a valid control …

Hardware-Assisted Packed Malware Analysis

E Leal - 2024 - search.proquest.com
Malware, a combination of the words" malicious software," is a formidable adversary in the
ever-evolving landscape of cybersecurity. It encompasses a wide array of harmful software …

A Survey of Machine Learning Approaches to Cyber Data Breach Detection: Current Challenges and Future Research Directions

P Yeboah, ASM Kayes, W Rahayu, E Pardede… - Authorea Preprints - techrxiv.org
Although several machine learning driven solutions are deemed to be effective at detecting
data breaches, the recent proliferation in data breach incidents resulting from cyber attacks …

Feature Creation Towards the Detection of Non-control-Flow Hijacking Attacks

Z Blasingame, C Liu, X Yao - International Conference on Artificial Neural …, 2021 - Springer
With malware attacks on the rise, approaches using low-level hardware information to detect
these attacks have been gaining popularity recently. This is achieved by using hardware …

Quantitative Metrics and Measurement Methodologies for System Security Assurance

MS Ahmed - 2022 - vtechworks.lib.vt.edu
Proactive approaches for preventing attacks through security measurements are crucial for
preventing sophisticated attacks. However, proactive measures must employ qualitative …