Malware Speaks! Deep Learning Based Assembly Code Processing for Detecting Evasive Cryptojacking

G Mani, M Kim, B Bhargava, P Angin… - … on Dependable and …, 2023 - ieeexplore.ieee.org
The increasing prevalence of blockchain-based cryptocurrencies as a payment instrument in
the past decade and the rewards earned by the cryptominers has resulted in a new class of …

Toward rigorous object-code coverage criteria

T Byun, V Sharma, S Rayadurgam… - 2017 IEEE 28th …, 2017 - ieeexplore.ieee.org
Object-branch coverage (OBC) is often used as a measure of the thoroughness of tests
suites, augmenting or substituting source-code based structural criteria such as branch …

Deep Learning Based Models for Cognitive Autonomy and Cybersecurity Intelligence in Autonomous Systems

G Mani - 2022 - hammer.purdue.edu
Cognitive autonomy of an autonomous system depends on its cyber module's ability to
comprehend the actions and intent of the applications and services running on that system …