Memory Management Method

Obsidian: Cooperative State-Space Exploration for Performant Inference on Secure ML Accelerators

Authors: Sarbartha Banerjee, Shijia Wei, Prakash Ramrakhyani, Mohit Tiwari | Published: 2024-09-04
Energy Management
Memory Management Method
Optimization Problem

Memory Scraping Attack on Xilinx FPGAs: Private Data Extraction from Terminated Processes

Authors: Bharadwaj Madabhushi, Sandip Kundu, Daniel Holcomb | Published: 2024-05-22
FPGA
Watermarking
Memory Management Method

Predicting SSH keys in Open SSH Memory dumps

Authors: Florian Rascoussier | Published: 2024-01-24
Watermarking
Data Preprocessing
Memory Management Method

When eBPF Meets Machine Learning: On-the-fly OS Kernel Compartmentalization

Authors: Zicheng Wang, Tiejin Chen, Qinrun Dai, Yueqi Chen, Hua Wei, Qingkai Zeng | Published: 2024-01-11
Watermarking
Memory Management Method
Model Performance Evaluation

Introducing Packet-Level Analysis in Programmable Data Planes to Advance Network Intrusion Detection

Authors: Roberto Doriguzzi-Corin, Luis Augusto Dias Knob, Luca Mendozzi, Domenico Siracusa, Marco Savi | Published: 2023-07-12 | Updated: 2024-01-04
Packet Interaction
Memory Management Method
Intrusion Detection System

NeuDep: Neural Binary Memory Dependence Analysis

Authors: Kexin Pei, Dongdong She, Michael Wang, Scott Geng, Zhou Xuan, Yaniv David, Junfeng Yang, Suman Jana, Baishakhi Ray | Published: 2022-10-04
Memory Management Method
Model Design
Dynamic Analysis Method

SmartKex: Machine Learning Assisted SSH Keys Extraction From The Heap Dump

Authors: Christofer Fellicious, Stewart Sentanoe, Michael Granitzer, Hans P. Reiser | Published: 2022-09-12 | Updated: 2022-09-13
Memory Management Method
Random Forest
Machine Learning Method

Exploiting Nanoelectronic Properties of Memory Chips for Prevention of IC Counterfeiting

Authors: Supriya Chakraborty, Tamoghno Das, Manan Suri | Published: 2022-09-09
IC Counterfeiting Prevention Method
Memory Management Method
Machine Learning

SAGE: Software-based Attestation for GPU Execution

Authors: Andrei Ivanov, Benjamin Rothenberger, Arnaud Dethise, Marco Canini, Torsten Hoefler, Adrian Perrig | Published: 2022-09-07
Secure Communication Channel
Memory Management Method
Adversarial Attack Detection

Does Fully Homomorphic Encryption Need Compute Acceleration?

Authors: Leo de Castro, Rashmi Agrawal, Rabia Yazicigil, Anantha Chandrakasan, Vinod Vaikuntanathan, Chiraag Juvekar, Ajay Joshi | Published: 2021-12-13 | Updated: 2021-12-14
Algorithm Design
Memory Management Method
Communication Efficiency