Skip to main content

Showing 1–6 of 6 results for author: Sahita, R

Searching in archive cs. Search in all archives.
.
  1. arXiv:2304.06167  [pdf

    cs.CR cs.AR

    CoVE: Towards Confidential Computing on RISC-V Platforms

    Authors: Ravi Sahita, Atish Patra, Vedvyas Shanbhogue, Samuel Ortiz, Andrew Bresticker, Dylan Reid, Atul Khare, Rajnesh Kanwal

    Abstract: Multi-tenant computing platforms are typically comprised of several software and hardware components including platform firmware, host operating system kernel, virtualization monitor, and the actual tenant payloads that run on them (typically in a virtual machine, container, or application). This model is well established in large scale commercial deployment, but the downside is that all platform… ▽ More

    Submitted 12 April, 2023; originally announced April 2023.

    ACM Class: D.4.6

  2. arXiv:2102.12730  [pdf, other

    cs.CR

    Swivel: Hardening WebAssembly against Spectre

    Authors: Shravan Narayan, Craig Disselkoen, Daniel Moghimi, Sunjay Cauligi, Evan Johnson, Zhao Gang, Anjo Vahldiek-Oberwagner, Ravi Sahita, Hovav Shacham, Dean Tullsen, Deian Stefan

    Abstract: We describe Swivel, a new compiler framework for hardening WebAssembly (Wasm) against Spectre attacks. Outside the browser, Wasm has become a popular lightweight, in-process sandbox and is, for example, used in production to isolate different clients on edge clouds and function-as-a-service platforms. Unfortunately, Spectre attacks can bypass Wasm's isolation guarantees. Swivel hardens Wasm agains… ▽ More

    Submitted 19 March, 2021; v1 submitted 25 February, 2021; originally announced February 2021.

    Comments: Accepted at USENIX 21

    MSC Class: D.4.6 ACM Class: D.4.6

  3. arXiv:2003.06428  [pdf, other

    cs.CR cs.LG stat.ML

    Towards a Resilient Machine Learning Classifier -- a Case Study of Ransomware Detection

    Authors: Chih-Yuan Yang, Ravi Sahita

    Abstract: The damage caused by crypto-ransomware, due to encryption, is difficult to revert and cause data losses. In this paper, a machine learning (ML) classifier was built to early detect ransomware (called crypto-ransomware) that uses cryptography by program behavior. If a signature-based detection was missed, a behavior-based detector can be the last line of defense to detect and contain the damages. W… ▽ More

    Submitted 13 March, 2020; originally announced March 2020.

    Comments: Conference on Applied Machine Learning for Information Security 2019, Washington DC (CAMLIS)

  4. arXiv:1812.09400  [pdf, other

    cs.LG cs.CR stat.ML

    Towards resilient machine learning for ransomware detection

    Authors: Li Chen, Chih-Yuan Yang, Anindya Paul, Ravi Sahita

    Abstract: There has been a surge of interest in using machine learning (ML) to automatically detect malware through their dynamic behaviors. These approaches have achieved significant improvement in detection rates and lower false positive rates at large scale compared with traditional malware analysis methods. ML in threat detection has demonstrated to be a good cop to guard platform security. However it i… ▽ More

    Submitted 16 May, 2019; v1 submitted 21 December, 2018; originally announced December 2018.

  5. arXiv:1801.02318  [pdf, other

    cs.CR cs.LG

    HeNet: A Deep Learning Approach on Intel$^\circledR$ Processor Trace for Effective Exploit Detection

    Authors: Li Chen, Salmin Sultana, Ravi Sahita

    Abstract: This paper presents HeNet, a hierarchical ensemble neural network, applied to classify hardware-generated control flow traces for malware detection. Deep learning-based malware detection has so far focused on analyzing executable files and runtime API calls. Static code analysis approaches face challenges due to obfuscated code and adversarial perturbations. Behavioral data collected during execut… ▽ More

    Submitted 8 January, 2018; originally announced January 2018.

  6. arXiv:1704.05948  [pdf, other

    cs.CR cs.LG stat.ML

    Semi-supervised classification for dynamic Android malware detection

    Authors: Li Chen, Mingwei Zhang, Chih-Yuan Yang, Ravi Sahita

    Abstract: A growing number of threats to Android phones creates challenges for malware detection. Manually labeling the samples into benign or different malicious families requires tremendous human efforts, while it is comparably easy and cheap to obtain a large amount of unlabeled APKs from various sources. Moreover, the fast-paced evolution of Android malware continuously generates derivative malware fami… ▽ More

    Submitted 19 April, 2017; originally announced April 2017.