共 13 条
- [1] Detecting anomalies in DNS protocol traces via passive testing and process mining [J]. 2014 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2014, : 520 - 521
- [2] Using Page Offsets for Detecting Control-Flow Anomalies [J]. INNOVATIVE SECURITY SOLUTIONS FOR INFORMATION TECHNOLOGY AND COMMUNICATIONS, SECITC 2023, 2024, 14534 : 13 - 25
- [3] Post-silicon verification and debugging with control flow traces and patchable hardware [J]. 2012 IEEE INTERNATIONAL HIGH LEVEL DESIGN VALIDATION AND TEST WORKSHOP (HLDVT), 2012, : 100 - 107
- [5] Detecting Anomalies in Concurrent Programs based on Dynamic Control Flow Changes [J]. 2016 IEEE 30TH INTERNATIONAL PARALLEL AND DISTRIBUTED PROCESSING SYMPOSIUM WORKSHOPS (IPDPSW), 2016, : 308 - 317
- [6] Detecting self-mutating malware using control-flow graph matching [J]. DETECTION OF INTRUSIONS AND MALWARE & VULNERABILITY ASSESSMENT, PROCEEDINGS, 2006, 4064 : 129 - 143
- [7] Soteria: Detecting Adversarial Examples in Control Flow Graph-based Malware Classifiers [J]. 2020 IEEE 40TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS), 2020, : 888 - 898
- [9] NumChecker: Detecting Kernel Control-flow Modifying Rootkits by Using Hardware Performance Counters [J]. 2013 50TH ACM / EDAC / IEEE DESIGN AUTOMATION CONFERENCE (DAC), 2013,
- [10] A malware detection system using a hybrid approach of multi-heads attention-based control flow traces and image visualization [J]. JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS, 2022, 11 (01):