情感脆弱 发表于 2025-3-30 09:49:32
How Does Malware Use RDTSC? A Study on Operations Executed by Malware with CPU Cycle Measurementcles with a method that exploits the RDTSC instruction. Although the detection technique is widely known and well-studied, the actual usage of the RDTSC instruction by real malware has not yet been sufficiently clarified. In this paper, we present analysis results for RDTSC usage collected from more过份艳丽 发表于 2025-3-30 15:09:08
On Deception-Based Protection Against Cryptographic Ransomwareically by placing decoy files among user files. While this approach raises the bar against current ransomware, as any access to a decoy file is a sign of malicious activity, the robustness of decoy strategies has not been formally analyzed and fully tested. In this paper, we analyze existing decoy sDelectable 发表于 2025-3-30 18:40:46
http://reply.papertrans.cn/27/2693/269227/269227_53.pngProtein 发表于 2025-3-30 23:51:38
Memory Categorization: Separating Attacker-Controlled Datading full memory safety remain expensive, and leaner defenses only addressing control-flow data are insufficient..We introduce ., an approach to separate data based on attacker control to mitigate the exploitation of memory corruption vulnerabilities such as use-after-free and use-after-return. . imopportune 发表于 2025-3-31 00:53:45
http://reply.papertrans.cn/27/2693/269227/269227_55.png