Barnum: Detecting Document Malware via Control Flow Anomalies in Hardware Traces.
Carter YagemannSalmin SultanaLi ChenWenke LeePublished in: ISC (2019)
Keyphrases
- control flow
- data flow
- detecting anomalies
- software testing
- anomaly detection
- memory hierarchy
- workflow management systems
- process model
- transition systems
- modeling language
- detect anomalies
- computer systems
- computing power
- business process models
- hardware implementation
- formal semantics
- relational databases
- event logs
- information technology
- real world
- data sets