Proceedings of the 15th ACM International Conference on Computing Frontiers 2018
DOI: 10.1145/3203217.3203264
|View full text |Cite
|
Sign up to set email alerts
|

Comprehensive assessment of run-time hardware-supported malware detection using general and ensemble learning

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 22 publications
(10 citation statements)
references
References 8 publications
0
10
0
Order By: Relevance
“…1) Data collection: We used Intel Performance Counter Monitor tool (PCM) [19] to understand hardware (memory and processor) behavior. Several works used performance counters to estimate the performance and power consumption of processors [20], [21], [22] or employed performance counter for enhancing the security [23], [24], [25]. In this work we use performance counters to study the memory behavior.…”
Section: Methodsmentioning
confidence: 99%
“…1) Data collection: We used Intel Performance Counter Monitor tool (PCM) [19] to understand hardware (memory and processor) behavior. Several works used performance counters to estimate the performance and power consumption of processors [20], [21], [22] or employed performance counter for enhancing the security [23], [24], [25]. In this work we use performance counters to study the memory behavior.…”
Section: Methodsmentioning
confidence: 99%
“…e DT demonstrates that this architecture is capable of preventing damage, but the TNR on the test set of the DT model is so low (66. 19) that this model cannot be preferred to the RF (81.53 TNR), which still prevents over 90% of file damage.…”
Section: Measuring Damage Prevention In Real Timementioning
confidence: 97%
“…ROC measures the Area Under the Curve (AUC) for evaluating the robustness of each ML classifier [1,4]. The ROC corresponds to the probability that the classifier correctly identified which application is malware and which is benign.…”
Section: Comparison Of Receiver Operating Characteristicsmentioning
confidence: 99%
“…These programs are used to compromise user data and cripple networks [2,3]. The recent proliferation of computing devices in mobile and Internet-of-Things (IoTs) domains further exacerbates the malware attacks and calls for eective malware detection techniques [1,4]. A recent survey showed that the number of security incidents in 2014 rose to 42.8 million incidents [5].…”
Section: Introductionmentioning
confidence: 99%