Can Data-Only Exploits be Detected at Runtime Using Hardware Events?: A Case Study of the Heartbleed Vulnerability.
Gildo TorresChen LiuPublished in: HASP@ISCA (2016)
Keyphrases
- data processing
- raw data
- data sets
- data collection
- data analysis
- case study
- data acquisition
- synthetic data
- statistical analysis
- data points
- image data
- knowledge discovery
- spatial data
- missing data
- computer systems
- database
- data sources
- data structure
- high quality
- training data
- low cost
- complex data
- rare events
- original data
- prior knowledge
- real time