2019
DOI: 10.1007/978-3-030-30215-3_17
|View full text |Cite
|
Sign up to set email alerts
|

Barnum: Detecting Document Malware via Control Flow Anomalies in Hardware Traces

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
9
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 13 publications
(10 citation statements)
references
References 26 publications
0
9
0
Order By: Relevance
“…However, the problems of traditional CFI are: (1) Existing CFI implementations are not compatible with some of important code features (Xu et al 2019); (2) CFGs generated by static, dynamic or combined analysis cannot always be precisely completed due to some open problems (Horwitz 1997); (3) There always exist certain level of compromises between accuracy and performance overhead and other important properties (Tan and Jaeger 2017; Wang and Liu 2019). Recent research has proposed to apply Deep Learning on detecting control flow violation.…”
Section: A Closer Look At Applications Of Deep Learning In Achieving mentioning
confidence: 99%
“…However, the problems of traditional CFI are: (1) Existing CFI implementations are not compatible with some of important code features (Xu et al 2019); (2) CFGs generated by static, dynamic or combined analysis cannot always be precisely completed due to some open problems (Horwitz 1997); (3) There always exist certain level of compromises between accuracy and performance overhead and other important properties (Tan and Jaeger 2017; Wang and Liu 2019). Recent research has proposed to apply Deep Learning on detecting control flow violation.…”
Section: A Closer Look At Applications Of Deep Learning In Achieving mentioning
confidence: 99%
“…After doing a thorough literature search, we observed that security researchers are quite behind the trend of applying Deep Learning techniques to solve security problems. Only one paper has been founded by us, using Deep Learning techniques to directly enhance the performance of CFI [17]. This paper leveraged Deep Learning to detect document malware through checking program's execution traces that generated by hardware.…”
Section: Key Findings From a Closer Lookmentioning
confidence: 99%
“…In all surveyed papers, there are two kinds of control flow related data being used: program instruction sequences and CFGs. Barnum et al [17] employed statically and dynamically generated instruction sequences acquired by program disassembling and Intel R Processor Trace. CNNoverCFG [18] used self-designed algorithm to construct instruction level control-flow graph.…”
Section: Key Findings From a Closer Lookmentioning
confidence: 99%
See 2 more Smart Citations