Accuracy analyses and model comparison of machine learning adopted in building energy consumption prediction

Z Liu, D Wu, Y Liu, Z Han, L Lun… - Energy Exploration …, 2019 - journals.sagepub.com
It is of great significance to achieve the prediction of building energy consumption. However,
machine learning, as a promising technique for many practical applications, was rarely …

[HTML][HTML] Diversification and obfuscation techniques for software security: A systematic literature review

S Hosseinzadeh, S Rauti, S Laurén, JM Mäkelä… - Information and …, 2018 - Elsevier
Context: Diversification and obfuscation are promising techniques for securing software and
protecting computers from harmful malware. The goal of these techniques is not removing …

Prefetch side-channel attacks: Bypassing SMAP and kernel ASLR

D Gruss, C Maurice, A Fogh, M Lipp… - Proceedings of the 2016 …, 2016 - dl.acm.org
Modern operating systems use hardware support to protect against control-flow hijacking
attacks such as code-injection attacks. Typically, write access to executable pages is …

Shuffler: fast and deployable continuous code {re-randomization}

D Williams-King, G Gobieski, K Williams-King… - … USENIX Symposium on …, 2016 - usenix.org
While code injection attacks have been virtually eliminated on modern systems, programs
today remain vulnerable to code reuse attacks. Particularly pernicious are Just-In-Time ROP …

A survey on various threats and current state of security in android platform

P Bhat, K Dutta - ACM Computing Surveys (CSUR), 2019 - dl.acm.org
The advent of the Android system has brought smartphone technology to the doorsteps of
the masses. The latest technologies have made it affordable for every section of the society …

Compiler-assisted code randomization

H Koo, Y Chen, L Lu, VP Kemerlis… - … IEEE symposium on …, 2018 - ieeexplore.ieee.org
Despite decades of research on software diversification, only address space layout
randomization has seen widespread adoption. Code randomization, an effective defense …

Morpheus: A vulnerability-tolerant secure architecture based on ensembles of moving target defenses with churn

M Gallagher, L Biernacki, S Chen, ZB Aweke… - Proceedings of the …, 2019 - dl.acm.org
Attacks often succeed by abusing the gap between program and machine-level semantics--
for example, by locating a sensitive pointer, exploiting a bug to overwrite this sensitive data …

CodeArmor: Virtualizing the code space to counter disclosure attacks

X Chen, H Bos, C Giuffrida - 2017 IEEE European Symposium …, 2017 - ieeexplore.ieee.org
Code diversification is an effective strategy to prevent modern code-reuse exploits.
Unfortunately, diversification techniques are inherently vulnerable to information disclosure …

Semantics-preserving reinforcement learning attack against graph neural networks for malware detection

L Zhang, P Liu, YH Choi, P Chen - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
As an increasing number of deep-learning-based malware scanners have been proposed,
the existing evasion techniques, including code obfuscation and polymorphic malware, are …

Machine learning predictive framework for CO2 thermodynamic properties in solution

Z Zhang, H Li, H Chang, Z Pan, X Luo - Journal of CO2 Utilization, 2018 - Elsevier
CO 2 is the major greenhouse gas (GHG) emission throughout the world. For scientific and
industrial purposes, chemical absorption is regarded as an efficient method to capture CO 2 …