Current software attacks often build on exploits that subvert machine-code execution. The enforcement of a basic safety property, control-flow integrity (CFI), can prevent such attacks …
S Chen, J Xu, EC Sezer, P Gauriar… - USENIX security …, 2005 - usenix.org
Most memory corruption attacks and Internet worms follow a familiar pattern known as the control-data attack. Hence, many defensive techniques are designed to protect program …
Smartphone usage has been continuously increasing in recent years. Moreover, smartphones are often used for privacy-sensitive tasks, becoming highly valuable targets for …
Malware detectors require a specification of malicious behavior. Typically, these specifications are manually constructed by investigating known malware. We present an …
This study is a survey and classification of the state-of-the-art in behavioural biometrics which is based on skills, style, preference, knowledge, motor-skills or strategy used by …
D Mutz, F Valeur, G Vigna, C Kruegel - ACM Transactions on Information …, 2006 - dl.acm.org
Intrusion detection systems (IDSs) are used to detect traces of malicious activities targeted against the network and its resources. Anomaly-based IDSs build models of the expected …
X Wang, J He, Z Xie, G Zhao… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Ethereum smart contracts are programs that can be collectively executed by a network of mutually untrusted nodes. Smart contracts handle and transfer assets of values, offering …
Context: Run-time detection of system anomalies at the host level remains a challenging task. Existing techniques suffer from high rates of false alarms, hindering large-scale …
Intrusion detection systems that monitor sequences of system calls have recently become more sophisticated in defining legitimate application behavior. In particular, additional …