Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








415 Hits in 7.0 sec

Integrated Software Fingerprinting via Neural-Network-Based Control Flow Obfuscation

Haoyu Ma, Ruiqi Li, Xiaoxu Yu, Chunfu Jia, Debin Gao
2016 IEEE Transactions on Information Forensics and Security  
We then provide the first implementation of integrated fingerprinting called Neuroprint on top of a control flow obfuscator that replaces program's conditional structures with neural networks trained to  ...  Leveraging the rich entropy in the outputs of these neural networks, Neuroprint embeds software fingerprints such that a one-time construction of the networks serves both purposes of obfuscation and fingerprinting  ...  To take one step further, we propose the first realization of integrated fingerprinting -named Neuroprint -on top of a previously proposed neural-network-based software control flow obfuscation approach  ... 
doi:10.1109/tifs.2016.2555287 fatcat:lweugzs5pzhltpf3dfi42hzm4e

GNN4IP: Graph Neural Network for Hardware Intellectual Property Piracy Detection [article]

Rozhin Yasaei, Shih-Yuan Yu, Emad Kasaeyan Naeini, Mohammad Abdullah Al Faruque
2021 arXiv   pre-print
We model the hardware design as a graph and construct a graph neural network model to learn its behavior using the comprehensive dataset of register transfer level codes and gate-level netlists that we  ...  Watermarking and fingerprinting are proposed to detect IP piracy.  ...  Our architecture is inspired by the Spatial-based Graph Convolution Neural Network, which defines the convolution operation based on a node's spatial relations with the following phases: (i) message propagation  ... 
arXiv:2107.09130v1 fatcat:hmtwnfb3urflreowc7hbvgnjiy

Leveraging strategic connection migration-powered traffic splitting for privacy [article]

Mona Wang, Anunay Kulshrestha, Liang Wang, Prateek Mittal
2022 arXiv   pre-print
Network-level adversaries have developed increasingly sophisticated techniques to surveil and control users' network traffic.  ...  With CoMPS, we can split traffic mid-session across network paths and heterogeneous network protocols.  ...  Since TLS is integrated into QUIC, QUIC connections will also be susceptible to SNI-based censorship [21] .  ... 
arXiv:2205.03326v1 fatcat:6qcx4wrnvvc5rcoft3bqlekvua

Leveraging strategic connection migration-powered traffic splitting for privacy

Mona Wang, Anunay Kulshrestha, Liang Wang, Prateek Mittal
2022 Proceedings on Privacy Enhancing Technologies  
Network-level adversaries have developed increasingly sophisticated techniques to surveil and control users' network traffic.  ...  With CoMPS, we can split traffic mid-session across network paths and heterogeneous network protocols.  ...  Since TLS is integrated into QUIC, QUIC connections will also be susceptible to SNI-based censorship [21] .  ... 
doi:10.56553/popets-2022-0083 fatcat:jtihclzbobcirdomoefetsnciu

Obfuscation Revealed: Leveraging Electromagnetic Signals for Obfuscated Malware Classification

Duy-Phuc Pham, Damien Marion, Matthieu Mastio, Annelie Heuser
2021 Annual Computer Security Applications Conference  
Even more, our results show that we are able to classify altered malware samples with unseen obfuscation techniques during the training phase, and to determine what kind of obfuscations were applied to  ...  Using our approach, a malware analyst is able to obtain precise knowledge about malware type and identity, even in the presence of obfuscation techniques which may prevent static or symbolic binary analysis  ...  By integrating obfuscation techniques against software-based malware analysis systems, we are able to determine if these techniques also hinder analysis based on EM emanation, and if we can distinguish  ... 
doi:10.1145/3485832.3485894 fatcat:tqzl6tvwffdvxftflyzzdcyp3u

Malware Analysis and Classification: A Survey

Ekta Gandotra, Divya Bansal, Sanjeev Sofat
2014 Journal of Information Security  
Malware authors use obfuscation techniques [6] like dead code insertion, register reassignment, subroutine reordering, instruction substitution, code transposition, and code integration to evade detection  ...  One of the major and serious threats on the Internet today is malicious software, often referred to as a malware.  ...  authors would like to thank Government of India, Ministry of Communications and Information Technology, Department of Information Technology, New Delhi, for funding the Project "Development of Cloud Based  ... 
doi:10.4236/jis.2014.52006 fatcat:3tr7xtplorg7bjnuv6cv43wxc4

Authentication systems: principles and threats

Sarah N Abdulkader, Ayman Atia, Mostafa-Sami M Mostafa
2015 Computer and Information Science  
They are divided into knowledge based, token based, and biometric based authentication.  ...  Availability, integrity, and confidentiality represent the basic requirements that should be granted for successful authentication systems.  ...  Fingerprint obfuscation and impersonation are examples of presentation threats that attack the fingerprint authentication system at the sensor level.  ... 
doi:10.5539/cis.v8n3p155 fatcat:q2zk47molbbpvhxgw6k3lifh6y

Altered Fingerprints: Analysis and Detection

Soweon Yoon, Jianjiang Feng, A. K. Jain
2012 IEEE Transactions on Pattern Analysis and Machine Intelligence  
Several cases of fingerprint obfuscation have been reported in the press.  ...  Fingerprint image quality assessment software (e.g., NFIQ) cannot always detect altered fingerprints since the implicit image quality due to alteration may not change significantly.  ...  The authors would like to thank John Manzo of the FBI and Laura Tierney and Arun Vemury of the DHS for providing access to the altered fingerprint images.  ... 
doi:10.1109/tpami.2011.161 pmid:21808092 fatcat:ft43p73ejjgyte62ijwkwxferq

A Survey on Recent Advanced Research of CPS Security

Zhenhua Wang, Wei Xie, Baosheng Wang, Jing Tao, Enze Wang
2021 Applied Sciences  
Cyber-physical systems (CPSs) are next-generation intelligent systems that integrate computing, communication, and control. Malicious attacks on CPSs can lead to both property damage and casualties.  ...  , smart transportation, smart homes, and general grids); and (3) MADC (Measure, Attack, Defense, and Control) types.  ...  Gemini [142] is a neural network-based method for detecting the similarity of firmware.  ... 
doi:10.3390/app11093751 fatcat:fxby2wjzpnchrfshvilxalmptm

Review of Android Malware Detection Based on Deep Learning

Zhiqiang Wang, Qian Liu, Yaping Chi
2020 IEEE Access  
Although scholars have researched Android malware detection using deep learning, there is currently a lack of a detailed and comprehensive introduction to malware detection's latest research results based  ...  ACKNOWLEDGMENT This research was financially supported by the Key Lab of Information Network Security, Ministry of Public Security (C19614), the Fundamental Research Funds for the Central Universities(  ...  They propose an anti-obfuscation classification method for Android malicious applications integrating Recurrent Neural Network and Convolutional Neural Network, with antiobfuscation ability and lightness  ... 
doi:10.1109/access.2020.3028370 fatcat:tujn3ghssrfkffzafat7l3cnse

Hardware-assisted Machine Learning in Resource-constrained IoT Environments for Security: Review and Future Prospective

Georgios Kornaros
2022 IEEE Access  
To protect an IoT infrastructure, various solutions look into hardware-based methods for ML-based IoT authentication, access control, secure offloading, and malware detection schemes.  ...  review aims to illuminate the value of various approaches for addressing IoT security in a truly effective, flexible, and seamless manner, as well as to provide answers to questions about tradeoffs in integrating  ...  attacks) [103] , designers' trend involves control flow integrity (CFI) checking.  ... 
doi:10.1109/access.2022.3179047 fatcat:damwrncpzzbxzamtghwlmrg6v4

A Survey of Android Malware Static Detection Technology Based on Machine Learning

Qing Wu, Xueling Zhu, Bo Liu
2021 Mobile Information Systems  
Malicious applications stealing users' privacy information, sending text messages to trigger deductions, exploiting privilege escalation to control the system, etc., cause significant harm to end users  ...  To detect Android malware, researchers have proposed various techniques, among which the machine learning-based methods with static features of apps as input vectors have apparent advantages in code coverage  ...  Control Flow Graph and Data Flow Graph Features.  ... 
doi:10.1155/2021/8896013 doaj:9dc548d197fd404fbcd4ee962f374bde fatcat:mbuavifbmzfmjm3shzm4wcbm4a

Table of contents

2017 2017 IEEE International Symposium on Circuits and Systems (ISCAS)  
Software Defined Radio Implementations on Xilinx Zynq FPGA S-66 -An Adaptive and Low-Complexity All-Zero Block Detection for HEVC Encoder S-67 -A Convolutional Neural Network Approach for Half-Pel  ...  Methods for ASIC Designs Hardware-Based Anti-Counterfeiting Techniques for Safeguarding Supply Chain Integrity Revisit Sequential Logic Obfuscation: Attacks and Defenses TECHNICAL SESSIONS -TUESDAY, MAY  ... 
doi:10.1109/iscas.2017.8049750 fatcat:csazlovzq5g4bmzlf7uss65sy4

Smart Grid: Cyber Attacks, Critical Defense Approaches, and Digital Twin [article]

Tianming Zheng, Ming Liu, Deepak Puthal, Ping Yi, Yue Wu, Xiangjian He
2022 arXiv   pre-print
In the end, the paper puts forward our security considerations on the future development of DT-based smart grid.  ...  The survey is expected to help developers break knowledge barriers among smart grid, cybersecurity, and DT, and provide guidelines for future security design of DT-based smart grid.  ...  proposed Deep Vulnerability Identification via Graph Neural Networks (Devign) to identify the existence of vulnerabilities in source code functions.  ... 
arXiv:2205.11783v1 fatcat:fz43u2e6g5gyfepqz44tezelba

A meta-model for software protections and reverse engineering attacks

Cataldo Basile, Daniele Canavese, Leonardo Regano, Paolo Falcarin, Bjorn De Sutter
2019 Journal of Systems and Software  
They also use reverse engineering techniques as a preparatory step towards tampering with the software to break its integrity, e.g., to break license checks.  ...  All discussed tools are available as open source, and we evaluate their use as part of a software protection work flow on an open source application and industrial use cases. of algorithms [1] .  ...  For instance, the control flow flattening obfuscation technique is represented as a Protection class instance [24] .  ... 
doi:10.1016/j.jss.2018.12.025 fatcat:4v5vctri6re5ha7mtjdpzj3xoa
« Previous Showing results 1 — 15 out of 415 results