共 83 条
[21]
Basu K., 2019, 2019 56th ACM/IEEE Design Automation Conference (DAC), P1
[22]
"Tipped Off by Your Memory Allocator": Device-Wide User Activity Sequencing from Android Memory Images
[J].
25TH ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2018),
2018,
[23]
Why We Need a Theory of Maliciousness: Hardware Performance Counters in Security
[J].
INFORMATION SECURITY, ISC 2022,
2022, 13640
:381-389
[25]
Near-Memory & In-Memory Detection of Fileless Malware
[J].
PROCEEDINGS OF THE INTERNATIONAL SYMPOSIUM ON MEMORY SYSTEMS, MEMSYS 2020,
2020,
:23-38
[27]
C. I. for Cybersecurity, 2018, Intrusion detectionevaluation dataset (CICIDS2017)
[28]
IoTGUARD: Dynamic Enforcement of Security and Safety Policy in Commodity IoT
[J].
26TH ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2019),
2019,
[29]
Ciucu F, 2014, IEEE INFOCOM SER, P1896, DOI 10.1109/INFOCOM.2014.6848129
[30]
Costin A, 2014, PROCEEDINGS OF THE 23RD USENIX SECURITY SYMPOSIUM, P95