Proceedings of the International Conference on Compliers, Architectures and Synthesis for Embedded Systems Companion 2019
DOI: 10.1145/3349569.3351538
|View full text |Cite
|
Sign up to set email alerts
|

MicroArchitectural events and image processing-based hybrid approach for robust malware detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
6
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
9

Relationship

2
7

Authors

Journals

citations
Cited by 13 publications
(6 citation statements)
references
References 7 publications
0
6
0
Order By: Relevance
“…The grayscale images are further represented as sequence of patterns which are further used for sequence classification using RNN-LSTM's. Work in [5] introduces a hybrid approach which utilizes the microarchitectural traces obtained through on-chip embedded hardware performance counters (HPCs) and the application binary for malware detection. The obtained HPCs are fed to multi-stage machine learning (ML) classifier for detecting and classifying the malware.…”
Section: Classification Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…The grayscale images are further represented as sequence of patterns which are further used for sequence classification using RNN-LSTM's. Work in [5] introduces a hybrid approach which utilizes the microarchitectural traces obtained through on-chip embedded hardware performance counters (HPCs) and the application binary for malware detection. The obtained HPCs are fed to multi-stage machine learning (ML) classifier for detecting and classifying the malware.…”
Section: Classification Resultsmentioning
confidence: 99%
“…The hardware security discipline in recent years experienced a plethora of threats like the Malware attacks [1,2,3,4,5,6,7], Side-Channel Attacks [8,9,10,11], Hardware Trojan attacks [12], reverse engineering threats [13,14,15] and so on. We focus on the malware detection technique here along with some state-of-the-art works.…”
Section: Introductionmentioning
confidence: 99%
“…The hardware security discipline in recent years experienced a plethora of threats like the Malware attacks [1][2][3][4][5][6][7], Side-Channel Attacks [8][9][10][11], Hardware Trojan attacks [12], reverse engineering threats [13][14][15][16][17][18][19][20][21][22][23][24][25][26] and so on. I focus on the malware detection technique here along with some state-of-the-art works.…”
Section: Introduction To Malware Threatsmentioning
confidence: 99%
“…Consumer and defense systems demanded design and manufacturing of electronics with increased performance, compared to their predecessors [1]. As such systems became ubiquitous in a plethora of domains, their application surface increased, thus making them a target for adversaries [2][3][4][5][6][7][8][9][10][11][12][13][14]. Hence, with improved performance the aspect of security demanded even more attention of the designers.…”
Section: Introduction To Hardware Securitymentioning
confidence: 99%