Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Inputfinder: Reverse engineering closed binaries using hardware performance counters in Program Protection and Reverse Engineering Workshop (2015). 32 ...
Missing: Finder: | Show results with:Finder:
Abstract—This paper presents new methods and results for recognising black-box program functions using hardware performance counters (HPC), where an ...
Missing: Finder: | Show results with:Finder:
3.4 Evasive Malware. Attackers may attempt to evade detection by reverse-engi- neering the detector and mimicking the behavior of normal programs. Previous ...
Missing: Finder: | Show results with:Finder:
InputFinder: Reverse Engineering Closed Binaries using Hardware Performance Counters. In. Proceedings of the 5th Workshop on Program Protection and Reverse ...
Missing: Finder: | Show results with:Finder:
Our method relies on CPU hardware performance counters to determine the cache slice an address is mapped to. We show that our method gives a more precise ...
Missing: Finder: | Show results with:Finder:
... closed binaries and the focus of our work is hardware-assisted tracing. Hardware-assisted tracing consists of hardware tracing facilities that can be used to ...
"InputFinder: Reverse Engineering Closed Binaries using Hardware Performance Counters". Bogdan Copos and Praveen Murthy. 2015. In Proceedings of the 5th ...
The Pentium 4 and Intel Xeon processors also support "fast" (32-bit) and "slow" (40-bit) reads of the performance counters, selected with bit 31 of the ECX ...
Missing: Input Finder:
Dec 9, 2010 · Does anyone know of good products with comprehensive binary hardening and anti-reverse-engineering features?
Missing: Input Finder: Counters.
Abstract—. Spectre attacks can be catastrophic and widespread because they exploit common design flaws caused by the speculative capabilities.