Ensemble Learning for Effective Run-Time Hardware-Based Malware Detection: A Comprehensive Analysis and Classification
暂无分享,去创建一个
Avesta Sasan | Houman Homayoun | Setareh Rafatirad | Hossein Sayadi | Nisarg Patel | Sai Manoj P D | S. Rafatirad | Avesta Sasan | H. Homayoun | H. Sayadi | Nisarg Patel
[1] Nael B. Abu-Ghazaleh,et al. Malware-aware processors: A framework for efficient online malware detection , 2015, 2015 IEEE 21st International Symposium on High Performance Computer Architecture (HPCA).
[2] Avesta Sasan,et al. Analyzing hardware based malware detectors , 2017, 2017 54th ACM/EDAC/IEEE Design Automation Conference (DAC).
[3] Ian H. Witten,et al. The WEKA data mining software: an update , 2009, SKDD.
[4] Houman Homayoun,et al. Scheduling multithreaded applications onto heterogeneous composite cores architecture , 2017, 2017 Eighth International Green and Sustainable Computing Conference (IGSC).
[5] Avesta Sasan,et al. Machine Learning-Based Approaches for Energy-Efficiency Prediction and Scheduling in Composite Cores Architectures , 2017, 2017 IEEE International Conference on Computer Design (ICCD).
[6] Leo Breiman,et al. Bagging Predictors , 1996, Machine Learning.
[7] Salvatore J. Stolfo,et al. Unsupervised Anomaly-Based Malware Detection Using Hardware Features , 2014, RAID.
[8] Lesley Shannon,et al. Performance impacts and limitations of hardware memory access trace collection , 2017, Design, Automation & Test in Europe Conference & Exhibition (DATE), 2017.
[9] Salvatore J. Stolfo,et al. On the feasibility of online malware detection with performance counters , 2013, ISCA.
[10] Houman Homayoun,et al. Comprehensive assessment of run-time hardware-supported malware detection using general and ensemble learning , 2018, CF.
[11] Ramesh Karri,et al. Are hardware performance counters a cost effective way for integrity checking of programs , 2011, STC '11.
[12] Yoav Freund,et al. A decision-theoretic generalization of on-line learning and an application to boosting , 1997, EuroCOLT.
[13] Nael B. Abu-Ghazaleh,et al. Ensemble Learning for Low-Level Hardware-Supported Malware Detection , 2015, RAID.
[14] Eric Filiol,et al. Behavioral detection of malware: from a survey towards an established taxonomy , 2008, Journal in Computer Virology.
[15] Michail Maniatakos,et al. ConFirm: Detecting firmware modifications in embedded systems using Hardware Performance Counters , 2015, 2015 IEEE/ACM International Conference on Computer-Aided Design (ICCAD).
[16] SpruntBrinkley. The Basics of Performance-Monitoring Hardware , 2002 .
[17] Trevor Mudge,et al. MiBench: A free, commercially representative embedded benchmark suite , 2001 .
[18] Houman Homayoun,et al. Power conversion efficiency-aware mapping of multithreaded applications on heterogeneous architectures: A comprehensive parameter tuning , 2018, 2018 23rd Asia and South Pacific Design Automation Conference (ASP-DAC).
[19] Alberto Garcia-Serrano,et al. Anomaly Detection for malware identification using Hardware Performance Counters , 2015, ArXiv.
[20] Yoav Freund,et al. A decision-theoretic generalization of on-line learning and an application to boosting , 1995, EuroCOLT.
[21] Mahdi Abadi,et al. HPCMalHunter: Behavioral malware detection using hardware performance counters and singular value decomposition , 2014, 2014 4th International Conference on Computer and Knowledge Engineering (ICCKE).