2018 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications/ 12th IEEE International 2018
DOI: 10.1109/trustcom/bigdatase.2018.00251
|View full text |Cite
|
Sign up to set email alerts
|

Customized Machine Learning-Based Hardware-Assisted Malware Detection in Embedded Devices

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
19
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 39 publications
(19 citation statements)
references
References 3 publications
0
19
0
Order By: Relevance
“…These methods analyze the application programming interface (API) call logs to detect malicious behavior. Another ML-based malware detection method analyzes the hardware performance counters (HPCs) to detect malware execution at run-time [36]. A drawback of ML systems that are trained on API call logs, HPCs, and network logs, is that they are only able to detect the types of malware they have been trained on.…”
Section: Related Workmentioning
confidence: 99%
“…These methods analyze the application programming interface (API) call logs to detect malicious behavior. Another ML-based malware detection method analyzes the hardware performance counters (HPCs) to detect malware execution at run-time [36]. A drawback of ML systems that are trained on API call logs, HPCs, and network logs, is that they are only able to detect the types of malware they have been trained on.…”
Section: Related Workmentioning
confidence: 99%
“…f) Increment the iteration count k then return to step 2 if k < Q, Q is the sparsity level [22]. g) The approximation coefficients for the image have nonzero indices at the elements listed in [5,8,18,38].…”
Section: Restricted Isometry Propertymentioning
confidence: 99%
“…Finally, SAR image has a larger dynamic range compared to the optical image. Because of these differences, the SAR needs special techniques for compression that lead the researchers to make excessive efforts to overcome on these issues [7][8][9].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Smart grids are based on connected IoT and embedded devices that communicate with each other in the power network. Thus, improving the functionality of smart grids, smart buildings, and their IoT devices (e.g., energy management) has become a major research concern [1]. According to the infrastructure provided by smart grids, Demand Response (DR) programs introduce active players into the power distribution system.…”
Section: Introductionmentioning
confidence: 99%