Now showing items 1-6 of 6
Cyberattack Detection & Mitigation: A Goal-Oriented and Pattern-Based Approach
Concerns for computer-related security seem real and are increasingly becoming important just about everywhere. In particular, cyberattack — not necessarily attack through a physical means — has been drawing serious attention ...
Enhancing Cybersecurity with Encrypted Traffic Fingerprinting
Recently, network traffic analysis and cyber deception have been increasingly used in various applications to protect people, information, and systems from major cyber threats. Network traffic ﬁngerprinting is a traffic ...
On 3D Content Manipulation: Simplification, Modification and Authentication
With the rapid development in the area of computer graphics and depth sensing technologies, various tools have emerged for 3D content creation such as RGB-D cameras (e.g., Microsoft Kinect, RealSense), LiDAR sensors, CAD ...
Source-Free, Component-Driven Software Security Hardening
Hardening COTS binary software products (e.g., via control-flow integrity (CFI) and/or software fault isolation (SFI) defenses) is extremely complex in contexts where the surrounding software environment includes ...
Mitigating Cyberattack with Machine Learning-Based Feature Space Transforms
With the increase in attacks on software systems, there is a need for a new approach in software defense. In this work, we explore machine learning-based approaches for the detection and mitigation of attacks. A machine ...
Hardware-Based Workload Forensics and Malware Detection in Modern Microprocessors
Traditional computer forensics and/or malware detection methods are generally implemented at the operating system (OS) or the hypervisor level, which benefits from abundant software semantics and implementation flexibility. ...