No Forking Way: Detecting Cloning Attacks on Intel SGX Applications.
Samira BriongosGhassan KarameClaudio SorienteAnnika WildePublished in: CoRR (2023)
Keyphrases
- network intrusion detection systems
- computer architecture
- detecting malicious
- malicious activities
- database systems
- intrusion detection system
- network intrusion
- image watermarking
- detect malicious
- misuse detection
- security vulnerabilities
- traffic analysis
- multi core processors
- real time
- security protocols
- intrusion detection
- genetic algorithm
- data mining
- data sets