Identification of Return-Oriented Programming Attacks Using RISC-V Instruction Trace Data
An increasing number of embedded systems include dedicated neural hardware. To benefit from this specialized hardware, deep learning techniques to discover malware on embedded systems are needed. This effort evaluated candidate machine learning detection techniques for distinguishing exploited from...
| Main Authors: | Daniel F. Koranek, Scott R. Graham, Brett J. Borghetti, Wayne C. Henry |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
IEEE
2022-01-01
|
| Series: | IEEE Access |
| Subjects: | |
| Online Access: | https://ieeexplore.ieee.org/document/9762913/ |
Similar Items
-
Inside the IBM RISC system/6000 /
by: 314732 Bennett, Marcus
Published: (1994) -
IBM RISC system/6000 /
by: 241263 Harris, Clive
Published: (1993) -
Testing of reduced instruction set computer (RISC) microprocessor /
by: 515533 R.Logesh Raj Rajumanikam, et al.
Published: (2009) -
Computer Engineering Education Experiences with RISC-V Architectures—From Computer Architecture to Microcontrollers
by: Peter Jamieson, et al.
Published: (2022-08-01) -
IBM RISC system/6000 user guide /
by: 370706 Leaver, Mike, et al.
Published: (1993)