2021 22nd International Symposium on Quality Electronic Design (ISQED) 2021
DOI: 10.1109/isqed51717.2021.9424330
|View full text |Cite
|
Sign up to set email alerts
|

When Machine Learning Meets Hardware Cybersecurity: Delving into Accurate Zero-Day Malware Detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
15
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 26 publications
(15 citation statements)
references
References 16 publications
0
15
0
Order By: Relevance
“…IoT devices are sensitive to cyber-attacks as most IoT nodes are constantly attached and share data over the Internet (Roopak et al, 2019). The current development of portable and IoT devices has further amplified the consequence of malware attacks (He et al, 2021). As a result, the risks are exponentially more significant for IoT devices.…”
Section: Research Challenges and Issues In Cyber Securitymentioning
confidence: 99%
See 1 more Smart Citation
“…IoT devices are sensitive to cyber-attacks as most IoT nodes are constantly attached and share data over the Internet (Roopak et al, 2019). The current development of portable and IoT devices has further amplified the consequence of malware attacks (He et al, 2021). As a result, the risks are exponentially more significant for IoT devices.…”
Section: Research Challenges and Issues In Cyber Securitymentioning
confidence: 99%
“…"Zero-day" refers to newly realized security susceptibilities that attackers can exploit to attack systems. In other words, the vendor or the developer has "zero days" to fix it (He et al, 2021). The vendor or developer would have just learned about the flaw.…”
Section: Intrusion Detection Systems (Ids)mentioning
confidence: 99%
“…Although researchers have suggested solutions to many of the cyber security concerns raised by the characteristics of IoT, more research is required to address the security concerns and vulnerabilities identified in this paper, particularly at the physical layer. ML is a technology often recommended alongside AI as a solution for enhanced cyber security for IoT devices [78], [79], often due to its placement on the network edge [80]. Although ML offers significant benefits in enhancing security and privacy, one of the major disadvantages of the technology is the ability of cybercriminals to also use it as a tool to circumvent protective measures [81].…”
Section: D: Application Protocols and Application Services Layermentioning
confidence: 99%
“…Experimental results show that the proposed approach by applying AdaBoost ensemble learning to the random forest classifier as the regular classifier achieves 92% F-measure and 95% TPR, and is superior to zero-day malware detection using only the top. Despite using a small number of microarchitectural features captured at run-time by existing HPCs, He et al [32] propose an ensemble learning-based technique to improve the performance of standard malware detectors. e experimental results show that using only the top four microarchitectural features, our proposed approach of using AdaBoost ensemble learning on the Random Forest classifier as a regular classifier achieves 92% F-measure and 95% TPR with only 2% false positive rate in detecting zero-day malware.…”
Section: Literature Surveymentioning
confidence: 99%