An experimental analysis of security vulnerabilities in industrial IoT devices

X Jiang, M Lora, S Chattopadhyay - ACM Transactions on Internet …, 2020 - dl.acm.org
The revolutionary development of the Internet of Things has triggered a huge demand for
Internet of Things devices. They are extensively applied to various fields of social activities …

A Survey of Source Code Representations for Machine Learning-Based Cybersecurity Tasks

B Casey, J Santos, G Perry - arXiv preprint arXiv:2403.10646, 2024 - arxiv.org
Machine learning techniques for cybersecurity-related software engineering tasks are
becoming increasingly popular. The representation of source code is a key portion of the …

Hardware-assisted rootkit detection via on-line statistical fingerprinting of process execution

L Zhou, Y Makris - 2018 Design, Automation & Test in Europe …, 2018 - ieeexplore.ieee.org
Kernel rootkits generally attempt to maliciously tamper kernel objects and surreptitiously
distort program execution flow. Herein, we introduce a hardware-assisted hierarchical on …

Breaking active-set backward-edge CFI

M Theodorides, D Wagner - 2017 IEEE International …, 2017 - ieeexplore.ieee.org
Hardware-Assisted Flow Integrity extension (HAFIX) was proposed as a defense against
code-reuse attacks that exploit backward edges (returns). HAFIX provides fine-grained …

Quantum computing for software engineering: Prospects

A Miranskyy, M Khan, JPL Faye… - Proceedings of the 1st …, 2022 - dl.acm.org
Quantum computers (QCs) are maturing. When QCs are powerful enough, they may be able
to handle problems in chemistry, physics, and finance that are not classically solvable …

CFIEE: An Open-Source Critical Metadata Extraction Tool for RISC-V Hardware-Based CFI Schemes

W Li, W Wang, S Li - Electronics, 2024 - mdpi.com
Control flow critical metadata play a key role in hardware-based control flow integrity (CFI)
mechanisms that effectively monitor and secure program control flow based on pre-extracted …

TPE: a hardware-based TLB profiling expert for workload reconstruction

L Zhou, Y Zhang, Y Makris - IEEE Journal on Emerging and …, 2021 - ieeexplore.ieee.org
We propose TPE, a hardware-based framework to perform workload execution forensics in
microprocessors. Specifically, TPE leverages custom hardware instrumentation to capture …

String comparison on a quantum computer using hamming distance

M Khan, A Miranskyy - arXiv preprint arXiv:2106.16173, 2021 - arxiv.org
The Hamming distance is ubiquitous in computing. Its computation gets expensive when
one needs to compare a string against many strings. Quantum computers (QCs) may speed …

Hardware-based workload forensics and malware detection in microprocessors

L Zhou, Y Makris - … Workshop on Microprocessor and SOC Test …, 2016 - ieeexplore.ieee.org
We investigate the possibility of performing workload forensics and/or malware detection in
microprocessors through exclusively hardware-based methodologies. Specifically, we first …

[PDF][PDF] Breaking Active-Set Backward-Edge Control-Flow Integrity

M Theodorides - 2017 - eecs.berkeley.edu
Abstract Hardware-Assisted Flow Integrity eXtension (HAFIX) was proposed as a defense
against code-reuse attacks that exploit backward edges (returns). HAFIX provides fine …