2018
DOI: 10.3233/jcs-171060
|View full text |Cite
|
Sign up to set email alerts
|

Identifying stealth malware using CPU power consumption and learning algorithms

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
3
1

Relationship

1
7

Authors

Journals

citations
Cited by 11 publications
(4 citation statements)
references
References 36 publications
0
4
0
Order By: Relevance
“…[37] described a network time analysis approach for monitoring performance changes caused by hardware virtualization, with the goal of detecting the hardware virtualization rootkit. [11,39] identify rootkits by using power-based malware detection on general-purpose computers and [19,39,61] use machine learning (ML) and deep learning (DL) to perform a behavioral detection method based on CPU power consumption. Gibraltar [6] and Copilot [49] leverage direct memory access (DMA) via physical PCI to separately detect rootkit in kernel memory from another machine.…”
Section: Related Workmentioning
confidence: 99%
“…[37] described a network time analysis approach for monitoring performance changes caused by hardware virtualization, with the goal of detecting the hardware virtualization rootkit. [11,39] identify rootkits by using power-based malware detection on general-purpose computers and [19,39,61] use machine learning (ML) and deep learning (DL) to perform a behavioral detection method based on CPU power consumption. Gibraltar [6] and Copilot [49] leverage direct memory access (DMA) via physical PCI to separately detect rootkit in kernel memory from another machine.…”
Section: Related Workmentioning
confidence: 99%
“…Luckett et al [19] have proposed in their study the emulator checks environment attributes-API discrepancy, time difference and Inconsistencies-in CPU instructions execution mechanism-this was done using an emulator-those attributes may deduce the information about an antivirus [19].…”
Section: Literature Reviewmentioning
confidence: 99%
“…While academicians are interested in detecting malicious activity [17,[30][31], opportunities abound to improve Android malware detection accuracy in commercial AV. Zhou and Jiang [7] evaluated Android malware detection using the following antivirus programs: AVG Antivirus Free v2.9 (AVG), Lookout Security & Antivirus v6.9 (or Lookout), Norton Mobile Security Lite v2.5.0.379 (Norton), and TrendMicro Mobile Security Personal Edition v2.0.0.1294 (TrendMicro).…”
Section: Introductionmentioning
confidence: 99%