2019 IEEE International Parallel and Distributed Processing Symposium Workshops (IPDPSW) 2019
DOI: 10.1109/ipdpsw.2019.00130
|View full text |Cite
|
Sign up to set email alerts
|

An Accurate Tool for Modeling, Fingerprinting, Comparison, and Clustering of Parallel Applications Based on Performance Counters

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
3

Relationship

1
6

Authors

Journals

citations
Cited by 7 publications
(3 citation statements)
references
References 7 publications
0
3
0
Order By: Relevance
“…web browser, text editor, image viewer, audio player) based on intrinsic behavior. Ramos et al [41] developed an HPC-based tool to model, fingerprint, and compare behavior of applications for later classification. While neither of these tools were directly tested on malware, the application of HPCs to malicious behavior is a logical extension.…”
Section: Hardware Performance Counters In Malware and Ransomware Dete...mentioning
confidence: 99%
“…web browser, text editor, image viewer, audio player) based on intrinsic behavior. Ramos et al [41] developed an HPC-based tool to model, fingerprint, and compare behavior of applications for later classification. While neither of these tools were directly tested on malware, the application of HPCs to malicious behavior is a logical extension.…”
Section: Hardware Performance Counters In Malware and Ransomware Dete...mentioning
confidence: 99%
“…Additionally, there are cases where events need multiplexing, for example, when using more hardware events than the CPU can provide. There are also some well know problems regarding the precision of some events, as shown in many studies [20][21][22][23][24][25]. Some events that should be exact and deterministic (such as the number of executed instructions) show run-to-run variations and over-count on various architectures, even when running in strictly controlled environments.…”
Section: Related Workmentioning
confidence: 99%
“…They discussed the potential of clusters for application identification but did not evaluate their solution from this perspective. Ramos et al [8] relied on performance counters to cluster similar applications. The authors noted that the same application is sometimes present in multiple clusters, caused by input sizes changing application characteristics or specific input sizes only triggering specific parts of the code, thus altering application behavior.…”
Section: Related Workmentioning
confidence: 99%