Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleOctober 2019
LATCH: A Locality-Aware Taint CHecker
MICRO '52: Proceedings of the 52nd Annual IEEE/ACM International Symposium on MicroarchitecturePages 969–982https://doi.org/10.1145/3352460.3358327We present LATCH (short for Locality-Aware Taint CHecker), a generalizable architecture for optimizing dynamic information flow tracking (DIFT). LATCH exploits the observation that information flows under DIFT exhibit strong temporal locality, with ...
- research-articleSeptember 2018
A chip-level security framework for assessing sensor data integrity: work-in-progress
CODES '18: Proceedings of the International Conference on Hardware/Software Codesign and System SynthesisArticle No.: 20, Pages 1–2The continuously increasing inter-connectivity of sensor nodes that form the basis of the Internet-of-Things results in new avenues of attack exploitable by adversaries to maliciously modify data captured by these nodes. In this work, we present a ...
- ArticleMay 2014
Using Existing Hardware Services for Malware Detection
SPW '14: Proceedings of the 2014 IEEE Security and Privacy WorkshopsPages 204–208https://doi.org/10.1109/SPW.2014.49The paper is divided into two sections. First, we describe our experiments in using hardware-based metrics such as those collected by the BPU and MMU for detection of malware activity at runtime. Second, we sketch a defense-in-depth security model that ...
- research-articleJune 2013
On the feasibility of online malware detection with performance counters
- John Demme,
- Matthew Maycock,
- Jared Schmitz,
- Adrian Tang,
- Adam Waksman,
- Simha Sethumadhavan,
- Salvatore Stolfo
ISCA '13: Proceedings of the 40th Annual International Symposium on Computer ArchitecturePages 559–570https://doi.org/10.1145/2485922.2485970The proliferation of computers in any domain is followed by the proliferation of malware in that domain. Systems, including the latest mobile platforms, are laden with viruses, rootkits, spyware, adware and other classes of malware. Despite the ...
Also Published in:
ACM SIGARCH Computer Architecture News: Volume 41 Issue 3