2019
DOI: 10.1109/mwc.2019.1800505
|View full text |Cite
|
Sign up to set email alerts
|

Detecting Malware on X86-Based IoT Devices in Autonomous Driving

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 18 publications
(9 citation statements)
references
References 8 publications
0
9
0
Order By: Relevance
“…Finally, a deep belief network (DBN) with optimized activation function was constructed to attribute the malware. In [4], Niu et al combined static analysis and extreme gradient boosting (XGBoost) method to overcome the low accuracy of static analysis and high resource overhead of dynamic analysis on X86-based IoT devices in an autonomous driving application. In [30], the opcodes of IoT applications were transmuted into a vector space, and then fuzzy and fast fuzzy tree methods were developed to detect and classify the malware.…”
Section: Machine Learning Methods On Edge Malware Detection and Categmentioning
confidence: 99%
“…Finally, a deep belief network (DBN) with optimized activation function was constructed to attribute the malware. In [4], Niu et al combined static analysis and extreme gradient boosting (XGBoost) method to overcome the low accuracy of static analysis and high resource overhead of dynamic analysis on X86-based IoT devices in an autonomous driving application. In [30], the opcodes of IoT applications were transmuted into a vector space, and then fuzzy and fast fuzzy tree methods were developed to detect and classify the malware.…”
Section: Machine Learning Methods On Edge Malware Detection and Categmentioning
confidence: 99%
“…Existing cross-architecture dynamic analysis lacks a method that treats system calls as the only feature type. Therefore, we use two static analysis methods based on a single architecture [ 5 , 6 ] and compare them against MDABP. Specifically, Hu et al [ 5 ] proposed an ARM architecture-based IoT malware detection model that employed opcodes as features for classification.…”
Section: Experimental Evaluationmentioning
confidence: 99%
“…Rapid advances in software development techniques allow the source code of malware to be compiled into different executable programs tailored to different central processing unit (CPU) architectures via toolchains [ 4 ]. In addition to accelerating the spread of IoT malware, this also means that malware detection methods [ 5 , 6 ] based on a single CPU architecture do not meet the analysis requirements any longer. Given that the opcodes, instruction sets, and other characteristics of the executable files compiled on various CPU architectures differ [ 7 ], the static analysis method based on a single CPU architecture uses features that do not contain features of samples compiled based on other CPU architectures.…”
Section: Introductionmentioning
confidence: 99%
“…LightGBM is suitable for this study since it is able to process big datasets, runs fast and requires less memory. XGBoost [31], commonly used in machine learning technique, is also from a family of a gradient boosting. It is originated from Gradient Boosting Decision Tree (GBDT).…”
Section: Ensemble Learning Phasementioning
confidence: 99%