情感脆弱 发表于 2025-3-30 09:49:32

How Does Malware Use RDTSC? A Study on Operations Executed by Malware with CPU Cycle Measurementcles with a method that exploits the RDTSC instruction. Although the detection technique is widely known and well-studied, the actual usage of the RDTSC instruction by real malware has not yet been sufficiently clarified. In this paper, we present analysis results for RDTSC usage collected from more

过份艳丽 发表于 2025-3-30 15:09:08

On Deception-Based Protection Against Cryptographic Ransomwareically by placing decoy files among user files. While this approach raises the bar against current ransomware, as any access to a decoy file is a sign of malicious activity, the robustness of decoy strategies has not been formally analyzed and fully tested. In this paper, we analyze existing decoy s

Delectable 发表于 2025-3-30 18:40:46

http://reply.papertrans.cn/27/2693/269227/269227_53.png

Protein 发表于 2025-3-30 23:51:38

Memory Categorization: Separating Attacker-Controlled Datading full memory safety remain expensive, and leaner defenses only addressing control-flow data are insufficient..We introduce ., an approach to separate data based on attacker control to mitigate the exploitation of memory corruption vulnerabilities such as use-after-free and use-after-return. . im

opportune 发表于 2025-3-31 00:53:45

http://reply.papertrans.cn/27/2693/269227/269227_55.png
页: 1 2 3 4 5 [6]
查看完整版本: Titlebook: Detection of Intrusions and Malware, and Vulnerability Assessment; 16th International C Roberto Perdisci,Clémentine Maurice,Magnus Almgren