PT-CFI: Transparent backward-edge control flow violation detection using intel processor trace

Y Gu, Q Zhao, Y Zhang, Z Lin - Proceedings of the Seventh ACM on …, 2017 - dl.acm.org
This paper presents PT-CFI, a new backward-edge control flow violation detection system
based on a novel use of a recently introduced hardware feature called Intel Processor Trace …

Human attention assessment using a machine learning approach with gan-based data augmentation technique trained using a custom dataset

S Pepe, S Tedeschi, N Brandizzi, S Russo, L Iocchi… - OBM …, 2022 - lidsen.com
Human–robot interactions require the ability of the system to determine if the user is paying
attention. However, to train such systems, massive amounts of data are required. In this …

[图书][B] Big data in ehealthcare: challenges and perspectives

N Mukherjee, S Neogy, S Chattopadhyay - 2019 - taylorfrancis.com
This book focuses on the different aspects of handling big data in healthcare. It showcases
the current state-of-the-art technology used for storing health records and health data …

Recprov: Towards provenance-aware user space record and replay

Y Ji, S Lee, W Lee - Provenance and Annotation of Data and Processes …, 2016 - Springer
Deterministic record and replay systems have widely been used in software debugging,
failure diagnosis, and intrusion detection. In order to detect the Advanced Persistent Threat …

VRT: A Runtime Protection Against Back-Edge Control Flow Integrity Violation

SK Sah, LK Sah - 2024 IEEE 67th International Midwest …, 2024 - ieeexplore.ieee.org
In this study, we instrumented runtime instructions to extract real-time memory addresses of
program variables, constructing a table as a tool to enforce back-edge control flow integrity …

AutoProv: An Automated File Provenance Collection Tool

RA Good - 2017 - scholar.afit.edu
A file's provenance is a detailing of its origins and activities. There are tools available that
are useful in maintaining the provenance of a file. Unfortunately for digital forensics, these …

High-Fidelity Provenance: Exploring the Intersection of Provenance and Security

E Stamatogiannakis - 2021 - research.vu.nl
In the past 25 years, the World Wide Web has disrupted the way news are disseminated and
consumed. However, the euphoria for the democratization of news publishing was soon …

[PDF][PDF] High-Fidelity Provenance

M Stamatogiannakis - research.vu.nl
In recent years, exposure to fake news has become a global phenomenon. The shift to
digital news distribution over the World Wide Web is a major contributing factor to this trend …

[PDF][PDF] PT-CFI: Practical Backward-Edge Control Flow Integrity Using Intel Processor Trace

Y Gu, Q Zhao, Y Zhang, Z Lin - yinqian.org
This paper presents PT-CFI, a new backward-edge control flow integrity (CFI) based on a
recently introduced hardware feature in Intel x86 called Processor Trace (PT). Designed …