Zobrazeno 1 - 10
of 685
pro vyhledávání: '"Dynamic information flow tracking"'
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Autor:
BRANT, CHRISTOPHER1 cdbrant@ufl.edu, SHRESTHA, PRAKASH1 prakash.shrestha@ufl.edu, MIXON-BACA, BENJAMIN2 bmixonba@asu.edu, CHEN, KEJUN1 kejunchen@ufl.edu, VARLIOGLU, SAID3 varlioms@mail.uc.edu, ELSAYED, NELLY3 elsayeny@ucmail.uc.edu, JIN, YIER1 yier.jin@ece.ufl.edu, CRANDALL, JEDIDIAH2 jedimaestro@asu.edu, OLIVEIRA, DANIELA1 daniela@ece.ufl.edu
Publikováno v:
ACM Computing Surveys. Jan2023, Vol. 55 Issue 1, p1-33. 33p.
Autor:
Moothedath, Shana, Sahabandu, Dinuka, Allen, Joey, Bushnell, Linda, Lee, Wenke, Poovendran, Radha
Publikováno v:
In Automatica January 2024 159
Autor:
Moothedath, Shana, Sahabandu, Dinuka, Allen, Joey, Bushnell, Linda, Lee, Wenke, Poovendran, Radha
Advanced persistent threats (APTs) are organized prolonged cyberattacks by sophisticated attackers. Although APT activities are stealthy, they interact with the system components and these interactions lead to information flows. Dynamic Information F
Externí odkaz:
http://arxiv.org/abs/2007.12327
Autor:
Sahabandu, Dinuka, Moothedath, Shana, Allen, Joey, Bushnell, Linda, Lee, Wenke, Poovendran, Radha
Advanced Persistent Threats (APTs) are stealthy attacks that threaten the security and privacy of sensitive information. Interactions of APTs with victim system introduce information flows that are recorded in the system logs. Dynamic Information Flo
Externí odkaz:
http://arxiv.org/abs/2007.00076
Autor:
Moothedath, Shana, Sahabandu, Dinuka, Allen, Joey, Clark, Andrew, Bushnell, Linda, Lee, Wenke, Poovendran, Radha
Advanced Persistent Threats (APTs) are stealthy customized attacks by intelligent adversaries. This paper deals with the detection of APTs that infiltrate cyber systems and compromise specifically targeted data and/or infrastructures. Dynamic informa
Externí odkaz:
http://arxiv.org/abs/2006.12327
Autor:
BRANT, CHRISTOPHER1, SHRESTHA, PRAKASH1, MIXON-BACA, BENJAMIN2, KEJUN CHEN1, VARLIOGLU, SAID3, ELSAYED, NELLY3, YIER JIN1, CRANDALL, JEDIDIAH2, OLIVEIRA, DANIELA2
Publikováno v:
ACM Computing Surveys. Jan2022, Vol. 54 Issue 1, p1-33. 33p. 4 Diagrams, 3 Charts, 1 Graph.
Software-based attacks exploit bugs or vulnerabilities to get unauthorized access or leak confidential information. Dynamic information flow tracking (DIFT) is a security technique to track spurious information flows and provide strong security guara
Externí odkaz:
http://arxiv.org/abs/1912.11153
Systems-on-chip (SoCs) are becoming heterogeneous: they combine general-purpose processor cores with application-specific hardware components, also known as accelerators, to improve performance and energy efficiency. The advantages of heterogeneity,
Externí odkaz:
http://arxiv.org/abs/1903.06801
Autor:
Moothedath, Shana, Sahabandu, Dinuka, Allen, Joey, Clark, Andrew, Bushnell, Linda, Lee, Wenke, Poovendran, Radha
Advanced Persistent Threats (APTs) infiltrate cyber systems and compromise specifically targeted data and/or resources through a sequence of stealthy attacks consisting of multiple stages. Dynamic information flow tracking has been proposed to detect
Externí odkaz:
http://arxiv.org/abs/1811.05622