Execution at RISC: Stealth JOP Attacks on RISC-V Applications

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:European Symposium on Research in Computer Security (28. : 2023 : Den Haag) Computer security ; Part 2: CPS4CIP, ADIoT, SecAssure, WASP, TAURIN, PriST-AL, and SECAI
1. Verfasser: Buckwell, Loïc (VerfasserIn)
Weitere Verfasser: Gilles, Olivier (VerfasserIn), Pérez, Daniel Gracia (VerfasserIn), Kosmatov, Nikolai (VerfasserIn)
Pages:2
Format: UnknownFormat
Sprache:eng
Veröffentlicht: 2024
Schlagworte:
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Titel Jahr Verfasser
Unravelling Network-Based Intrusion Detection: A Neutrosophic Rule Mining and Optimization Framework 2024 Dias, Tiago Fontes
IM-DISCO: Invariant Mining for Detecting IntrusionS in Critical Operations 2024 Saraiva, Guilherme
Labeling NIDS Rules with MITRE ATT &CK Techniques Using ChatGPT 2024 Daniel, Nir
DETONAR-Light: An IoT Network Intrusion Detection Using DETONAR without a Sniffer Network 2024 Bull, Victoria
SigIL: A Signature-Based Approach of Malware Detection on Intermediate Language 2024 Fortino, Giancarlo
Trust Assumptions in Voting Systems 2024 Krips, Kristjan
Towards Security Transparency of Autonomous Systems on the Internet 2024 Khadka, Shyam Krishna
Pixels Who Violate Our Privacy! Deep Learning for Identifying Images’ Key Pixels 2024 Veenker, Carmen
An Efficient CKKS-FHEW/TFHE Hybrid Encrypted Inference Framework 2024 Liu, Tzu-Li
CO-DECYBER: Co-operative Decision Making for Cybersecurity Using Deep Multi-agent Reinforcement Learning 2024 Cheah, Madeline
Backdoor Attacks Leveraging Latent Representation in Competitive Learning 2024 Iwahana, Kazuki
The Road Towards Autonomous Cybersecurity Agents: Remedies for Simulation Environments 2024 Drašar, Martin
Mitigating Gradient Inversion Attacks in Federated Learning with Frequency Transformation 2024 Palihawadana, Chamath
Simulating Deception for Web Applications Using Reinforcement Learning 2024 Kvasov, Andrei
SecAssure 2023 2024
CPS4CIP 2023 2024
A Methodology for Cybersecurity Risk Assessment in Supply Chains 2024 Gokkaya, Betul
User Behavior Analysis for Malware Detection 2024 Dumitrasc, Valentina
Single-Server Batch Delegation of Variable-Input Pairings with Unbounded Client Lifetime 2024 Crescenzo, Giovanni Di
Forkfuzz: Leveraging the Fork-Awareness in Coverage-Guided Fuzzing 2024 Maugeri, Marcello
Alle Artikel auflisten