Sok: The challenges, pitfalls, and perils of using hardware performance counters for security

S Das, J Werner, M Antonakakis… - … IEEE Symposium on …, 2019 - ieeexplore.ieee.org
Hardware Performance Counters (HPCs) have been available in processors for more than a
decade. These counters can be used to monitor and measure events that occur at the CPU …

Exploitation techniques for data-oriented attacks with existing and potential defense approaches

L Cheng, S Ahmed, H Liljestrand, T Nyman… - ACM Transactions on …, 2021 - dl.acm.org
Data-oriented attacks manipulate non-control data to alter a program's benign behavior
without violating its control-flow integrity. It has been shown that such attacks can cause …

Nights-watch: A cache-based side-channel intrusion detector using hardware performance counters

M Mushtaq, A Akram, MK Bhatti, M Chaudhry… - Proceedings of the 7th …, 2018 - dl.acm.org
This paper presents a novel run-time detection mechanism, called NIGHTs-WATCH, for
access-driven cache-based Side-Channel Attacks (SCAs). It comprises of multiple machine …

A survey of exploitation techniques and defenses for program data attacks

Y Wang, Q Li, Z Chen, P Zhang, G Zhang - Journal of Network and …, 2020 - Elsevier
In recent years, program data attacks (PDA) have become a popular topic in the field of
network security. PDAs are memory corruption vulnerability exploitation techniques that …

Fight hardware with hardware: Systemwide detection and mitigation of side-channel attacks using performance counters

S Carnà, S Ferracci, F Quaglia… - Digital Threats: Research …, 2023 - dl.acm.org
We present a kernel-level infrastructure that allows systemwide detection of malicious
applications attempting to exploit cache-based side-channel attacks to break the process …

Exploitation techniques and defenses for data-oriented attacks

L Cheng, H Liljestrand, MS Ahmed… - 2019 IEEE …, 2019 - ieeexplore.ieee.org
Data-oriented attacks manipulate non-control data to alter a program's benign behavior
without violating its control-flow integrity. It has been shown that such attacks can cause …

A methodology for selecting hardware performance counters for supporting non-intrusive diagnostic of flood DDoS attacks on web servers

PP do Nascimento, P Pereira, JM Mialaret, I Ferreira… - Computers & …, 2021 - Elsevier
Web server outages caused by a Distributed Denial of Service (DDoS) attacks have
increased considerably over the years. Intrusion Detection Systems (IDS) are not sufficient to …

Real-time edge processing detection of malicious attacks using machine learning and processor core events

R Oshana, MA Thornton, EC Larson… - 2021 IEEE …, 2021 - ieeexplore.ieee.org
A method for the detection of the malicious events such as the SPECTRE exploit is proposed
and evaluated using machine learning and processor core events. In this work, we use …

Use of Ensemble Learning to Detect Buffer Overflow Exploitation

A Youssef, M Abdelrazek, C Karmakar - IEEE Access, 2023 - ieeexplore.ieee.org
Software exploitation detection remains unresolved problem. Software exploits that target
known and unknown vulnerabilities are constantly used in attacks. Signature-based …

A rule-based approach for detecting heartbleed cyber attacks

A Amodei, D Capriglione, L Ferrigno… - … on Measurements & …, 2022 - ieeexplore.ieee.org
Today, cyber security is a very critical issue to be addressed at several levels for minimizing
the effects and consequences of cyber attacks. In the last decade many coun-termeasures …