Proceedings of the 54th Annual Design Automation Conference 2017 2017
DOI: 10.1145/3061639.3062202
|View full text |Cite
|
Sign up to set email alerts
|

Analyzing Hardware Based Malware Detectors

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
28
0

Year Published

2019
2019
2020
2020

Publication Types

Select...
4
1

Relationship

1
4

Authors

Journals

citations
Cited by 60 publications
(28 citation statements)
references
References 10 publications
0
28
0
Order By: Relevance
“…There also exist traditional approaches such as semantic [28], [29], [30] and signaturebased [31], [32], [33] solutions including off-the-shelf antiviruses as well. However, most of these techniques are slow, and require large computational resources and memory [34], [35], [36], [37], making them infeasible to be adopted in IoT and resource constrained devices. Furthermore, the emergence of new malware threats often requires patching or updating off-the-shelf software-based malware detection solutions (such as anti-virus) and incurs a large amount of memory, hardware resources, as well as network communication bandwidth.…”
Section: ) Limited Resource Availabilitymentioning
confidence: 99%
See 4 more Smart Citations
“…There also exist traditional approaches such as semantic [28], [29], [30] and signaturebased [31], [32], [33] solutions including off-the-shelf antiviruses as well. However, most of these techniques are slow, and require large computational resources and memory [34], [35], [36], [37], making them infeasible to be adopted in IoT and resource constrained devices. Furthermore, the emergence of new malware threats often requires patching or updating off-the-shelf software-based malware detection solutions (such as anti-virus) and incurs a large amount of memory, hardware resources, as well as network communication bandwidth.…”
Section: ) Limited Resource Availabilitymentioning
confidence: 99%
“…In addition, due to limited computing resources at the node-level, sophisticated and highly accurate malware detection solutions cannot be afforded [36], [39], [34], [35]. Consequently, deploying a semi-accurate malware detection method and a proactive approach such as immediately disconnecting the links in the network, while can confine malware, but also impact network performance and throughput, or even can result in communication loss, which is detrimental to the network performance.…”
Section: ) Limited Resource Availabilitymentioning
confidence: 99%
See 3 more Smart Citations