2020 IEEE Computer Society Annual Symposium on VLSI (ISVLSI) 2020
DOI: 10.1109/isvlsi49217.2020.00-15
|View full text |Cite
|
Sign up to set email alerts
|

Analyzing the Efficiency of Machine Learning Classifiers in Hardware-Based Malware Detectors

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
4
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 19 publications
(6 citation statements)
references
References 16 publications
0
4
0
Order By: Relevance
“…Hardware Performance Counters (HPCs) have been typically used by the programmers to analyze and measure the performance of applications and to identify the execution bottlenecks of a program (Beneventi et al, 2017;Kuruvila, Kundu & Basu, 2020). Initially, HPCs have been employed for investigating the static and dynamic analysis of programs to detect any malicious amendments as mentioned in Alam et al (2020) and Malone, Zahran & Karri (2011).…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations
“…Hardware Performance Counters (HPCs) have been typically used by the programmers to analyze and measure the performance of applications and to identify the execution bottlenecks of a program (Beneventi et al, 2017;Kuruvila, Kundu & Basu, 2020). Initially, HPCs have been employed for investigating the static and dynamic analysis of programs to detect any malicious amendments as mentioned in Alam et al (2020) and Malone, Zahran & Karri (2011).…”
Section: Introductionmentioning
confidence: 99%
“…Initially, HPCs have been employed for investigating the static and dynamic analysis of programs to detect any malicious amendments as mentioned in Alam et al (2020) and Malone, Zahran & Karri (2011). Several studies (Das et al, 2019;Demme et al, 2013;Singh et al, 2017;Wang et al, 2016) discuss potential implications of using HPC for application analysis, and the majority of them suggest that hardware execution profile can effectuate the detection of malware (Demme et al, 2013;Singh et al, 2017;Wang et al, 2016;Kuruvila, Kundu & Basu, 2020). Another study (Xu et al, 2017) has utilized the hardware execution profiles to detect malware using machine learning algorithms, as malware changes data structures and control flow, leaving fingerprints on accesses to program memory.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…The combination of these three words creates the main guidelines for protecting and securing information. Cloud/ Cluster/ Big data [100], [101], [117], [123], [134], [143], [164], [171], [197] 3 Industry [130], [52], [148], [171], [206], [ IoT devices in general Hardware [94], [95], [112], [114], [163], [168], [179], [180] Software [97], [98], [113], [122], [141], [152], [155], [157], [160], [181], [193]…”
Section: Ciamentioning
confidence: 99%
“…However, research efforts are already in progress to address this issue, e.g., it is recommended to develop behavioral-based antimalware like Intrusion Detection/Prevention Systems (IDPS) for IoT-based systems rather than using signature-based systems where loaded signature databases can slow down the performance of IoTbased systems [29]. Some research efforts are also on the way to improve the behavior-based antimalware further by using machine learning techniques such as Hierarchical Extreme Learning Machine (H-ELM) [30] and machine learning techniques in Hardware-based Malware Detectors (HMDs) [31,32]. Furthermore, spatial firewalls equipped with state-of-the-art security and antimalware programs are also being designed to protect the IoT-based systems [24].…”
Section: Analysis and Recommendations For Iot-based Paymentmentioning
confidence: 99%