VIPER: Spotting Syscall-Guard Variables for Data-Only Attacks.
Hengkai YeSong LiuZhechang ZhangHong HuPublished in: USENIX Security Symposium (2023)
Keyphrases
- data sets
- raw data
- high quality
- data collection
- original data
- training data
- data sources
- database
- probability distribution
- network structure
- data distribution
- statistical analysis
- image data
- data analysis
- data structure
- data points
- data mining techniques
- data processing
- probabilistic model
- xml documents
- metadata
- feature selection
- complex data