Hardware Performance Counter-Based Fine-Grained Malware Detection
暂无分享,去创建一个
Sai Praveen Kadiyala | Thambipillai Srikanthan | Siew-Kei Lam | Pranav Jadhav | T. Srikanthan | S. Kadiyala | S. Lam | Pranav Jadhav | P. Jadhav
[1] Carsten Willems,et al. Automatic analysis of malware behavior using machine learning , 2011, J. Comput. Secur..
[2] Debdeep Mukhopadhyay,et al. Who Watches the Watchmen?: Utilizing Performance Monitors for Compromising Keys of RSA on Intel Platforms , 2015, CHES.
[3] Manos Antonakakis,et al. SoK: The Challenges, Pitfalls, and Perils of Using Hardware Performance Counters for Security , 2019, 2019 IEEE Symposium on Security and Privacy (SP).
[4] Marco Chiappetta,et al. Real time detection of cache-based side-channel attacks using hardware performance counters , 2016, Appl. Soft Comput..
[5] Thomas Eisenbarth,et al. PerfWeb: How to Violate Web Privacy with Hardware Performance Events , 2017, ESORICS.
[6] Nael B. Abu-Ghazaleh,et al. Malware-aware processors: A framework for efficient online malware detection , 2015, 2015 IEEE 21st International Symposium on High Performance Computer Architecture (HPCA).
[7] Avesta Sasan,et al. Analyzing hardware based malware detectors , 2017, 2017 54th ACM/EDAC/IEEE Design Automation Conference (DAC).
[8] Salvatore J. Stolfo,et al. On the feasibility of online malware detection with performance counters , 2013, ISCA.
[9] Sevil Sen,et al. Coevolution of Mobile Malware and Anti-Malware , 2018, IEEE Transactions on Information Forensics and Security.
[10] Ashkan Sami,et al. MAAR: Robust features to detect malicious activity based on API calls, their arguments and return values , 2017, Eng. Appl. Artif. Intell..
[11] Ramesh Karri,et al. Reusing Hardware Performance Counters to Detect and Identify Kernel Control-Flow Modifying Rootkits , 2016, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems.
[12] Salvatore J. Stolfo,et al. Unsupervised Anomaly-Based Malware Detection Using Hardware Features , 2014, RAID.
[13] Jizeng Wei,et al. Micro-architectural Features for Malware Detection , 2016, ACA.
[14] Gaël Varoquaux,et al. Scikit-learn: Machine Learning in Python , 2011, J. Mach. Learn. Res..
[15] Ruby B. Lee,et al. DoS Attacks on Your Memory in Cloud , 2017, AsiaCCS.
[16] Christian Platzer,et al. MARVIN: Efficient and Comprehensive Mobile App Classification through Static and Dynamic Analysis , 2015, 2015 IEEE 39th Annual Computer Software and Applications Conference.
[17] John C. S. Lui,et al. ADAM: An Automatic and Extensible Platform to Stress Test Android Anti-virus Systems , 2012, DIMVA.
[18] Alexander E. Gegov,et al. A Comparison Study on Flush+Reload and Prime+Probe Attacks on AES Using Machine Learning Approaches , 2017, UKCI.
[19] Luis Muñoz-González,et al. Label Sanitization against Label Flipping Poisoning Attacks , 2018, Nemesis/UrbReas/SoGood/IWAISe/GDM@PKDD/ECML.
[20] Ruby B. Lee,et al. CloudRadar: A Real-Time Side-Channel Attack Detection System in Clouds , 2016, RAID.
[21] Mahdi Abadi,et al. HPCMalHunter: Behavioral malware detection using hardware performance counters and singular value decomposition , 2014, 2014 4th International Conference on Computer and Knowledge Engineering (ICCKE).
[22] Wei Zhang,et al. Semantics-Based Online Malware Detection: Towards Efficient Real-Time Protection Against Malware , 2016, IEEE Transactions on Information Forensics and Security.
[23] Yuval Elovici,et al. Trusted system-calls analysis methodology aimed at detection of compromised virtual machines using sequential mining , 2018, Knowl. Based Syst..