2021 58th ACM/IEEE Design Automation Conference (DAC) 2021
DOI: 10.1109/dac18074.2021.9586330
|View full text |Cite
|
Sign up to set email alerts
|

On-device Malware Detection using Performance-Aware and Robust Collaborative Learning

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
12
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
3
3
1

Relationship

1
6

Authors

Journals

citations
Cited by 25 publications
(12 citation statements)
references
References 17 publications
0
12
0
Order By: Relevance
“…The obtained HPCs are fed to multi-stage machine learning (ML) classifier for detecting and classifying the malware. Authors in [45] presents a collaborative machine learning (ML)-based malware detection framework. It introduces a) performance-aware precision-scaled federated learning (FL) to minimize the communication overheads with minimal device-level computations; and (2) a Robust and Active Protection with Intelligent Defense strategy against malicious activity (RAPID) at the device and network-level due to malware and other cyber-attacks.…”
Section: Classification Resultsmentioning
confidence: 99%
“…The obtained HPCs are fed to multi-stage machine learning (ML) classifier for detecting and classifying the malware. Authors in [45] presents a collaborative machine learning (ML)-based malware detection framework. It introduces a) performance-aware precision-scaled federated learning (FL) to minimize the communication overheads with minimal device-level computations; and (2) a Robust and Active Protection with Intelligent Defense strategy against malicious activity (RAPID) at the device and network-level due to malware and other cyber-attacks.…”
Section: Classification Resultsmentioning
confidence: 99%
“…Privacy issues during training are not considered. [9] Presented a novel classification approach based on dynamic analysis, which is robust to the obfuscation [11] Propose a novel and efficient approach which uses LSTM to obtain the feature representations of opcode sequences of malware [19] Feature mining of function call graph is carried out by graph embedding technique [15] Propose an approach that transforms the control flow diagram into RGB images for the convolutional neural network for malware detection [14] Propose a highly efficient method to extract API calls, permission rate, surveillance system events, and permissions as features [21] Proposed a semi-supervised federated learning algorithm that works without user supervision These schemes' lack of adaptability to the problems that the non-IID distribution of malware on different clients [22] Introduces a performance-aware FL framework to reduce the communication overhead of device-level computing [23] Proposed a robust FL-based framework, namely, Fed-IIoT, for detecting Android malware in the Internet of Things Existing methods that use ML/DL to classify malware rely on the vast amount of high-quality available data from different clients to train the accurate global model. These models are then distributed to individual clients, or these clients upload their test data to the server for real-time behavior checking and malware classification.…”
Section: Ref Key Contributions Limitations [12]mentioning
confidence: 99%
“…In addition, the author designed an auxiliary classifier generative adversarial network (AC-GAN) to generate invisible data for training. Shukla [ 22 ] introduces a performance-aware FL framework to reduce the communication overhead of device-level computing. Singh [ 25 ] uses the FL framework to train a web security model from users’ browsing data and share it with a centralized server.…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations