[AI Security] Mimicry Resilient Program Behavior Modeling with LSTM based Branch Models, DEEP LEARNING AND SECURITY WORKSHOP, May2018

Mimicry Resilient Program Behavior Modeling with LSTM based Branch Models, Hayoon Yi, Gyuwan Kimy, Jangho Leey, Sunwoo Ahn, Younghan Lee, Sungroh Yoon, Yunheung Paek, DEEP LEARNING AND SECURITY WORKSHOP 2018

0
0

International Papers

AI Security A Data Embedding Scheme for Efficient Program Behavior Modeling with Neural Networks (early access), IEEE Transactions on Emerging Topics in Computational Intelligence (Impact Factor: 8.28), May 2022
HW Security A Hardware Platform for Ensuring OS Kernel Integrity on RISC-V, MDPI Electronics, August 2021
AI Security Panop: Mimicry-Resistant ANN-based Distributed NIDS for IoT Networks, IEEE Access, July 2021
AI Security Learn2Evade: Learning-based Generative Model for Evading PDF Malware Classifiers, IEEE Transactions on Artificial Intelligence, July 2021
HW Security Ambassy: A Runtime Framework to Delegate Trusted Applications in an ARM/FPGA Hybrid System (early access), IEEE Transactions on Mobile Computing (TMC), Jun 2021
HW Security MeetGo: A Trusted Execution Environment for Remote Applications on FPGA (early access), IEEE Access, Mar 2021
SW Security ExpRace: Exploiting Kernel Races through Raising Interrupts (conditional accept), USENIX Security Symposium (Security), August 2021
SW Security Constraint-guided Directed Greybox Fuzzing (conditional accept), USENIX Security Symposium (Security), August 2021
SW Security M2MON: Building an MMIO-based Security Reference Monitor for Unmanned Vehicles (to appear), USENIX Security Symposium (Security), August 2021
SW Security KARD: Lightweight Data Race Detection with Per-Thread Memory Protection (to appear), International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS), April 2021
SW Security BlackMirror: Preventing Wallhacks in 3D Online FPS Games, ACM Conference on Computer and Communications Security (CCS), Nov 2020
SW Security CrFuzz: Fuzzing Multi-purpose Programs through Input Validation, ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering (FSE), Nov 2020
SW Security Vessels: Efficient and Scalable Deep Learning Prediction on Trusted Processors, ACM Symposium on Cloud Computing (SoCC), Oct 2020
SW Security Exploiting Kernel Races through Taming Thread Interleaving, BlackHat USA, Sep 2020
SW Security A Tale of Two Trees: One Writes, and Other Reads. Optimized Oblivious Accesses to Large-Scale Blockchains, Privacy Enhancing Technologies Symposium (PETS), July 2020
SW Security HFL: Hybrid Fuzzing on the Linux Kernel, Network and Distributed System Security Symposium (NDSS), Feb 2020
SW Security SBGen: A Framework to Efficiently Supply Runtime Information for a Learning-based HIDS for Multiple Virtual Machines(early access), IEEE Access, Nov 2020
HW Security A Metadata-driven Approach to Efficiently Detect Code Reuse Attacks on ARM Multiprocessors, The Journal of Supercomputing, Jan 2021
AI Security Hawkware: Network Intrusion Detection based on Behavior Analysis with ANNs on an IoT Device, Design Automation Conference (DAC), Jul 2020
HW Security TRUSTORE: Side-Channel Resistant Storage for SGX using Intel Hybrid CPU-FPGA, ACM Conference on Computer and Communications Security (CCS), Nov 2020