4.6 Article

Real-Time Hardware-Based Malware and Micro-Architectural Attack Detection Utilizing CMOS Reservoir Computing

Related references

Note: Only part of the references are listed.
Article Computer Science, Theory & Methods

A Theoretical Study of Hardware Performance Counters-Based Malware Detection

Kanad Basu et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2020)

Proceedings Paper Computer Science, Theory & Methods

Spectre Attacks: Exploiting Speculative Execution

Paul Kocher et al.

2019 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2019) (2019)

Proceedings Paper Computer Science, Software Engineering

Adversarial Attack on Microarchitectural Events based Malware Detectors

Sai Manoj Pudukotai Dinakarrao et al.

PROCEEDINGS OF THE 2019 56TH ACM/EDAC/IEEE DESIGN AUTOMATION CONFERENCE (DAC) (2019)

Proceedings Paper Computer Science, Theory & Methods

CacheShield: Detecting Cache Attacks through Self-Observation

Samira Briongos et al.

PROCEEDINGS OF THE EIGHTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY (CODASPY'18) (2018)

Article Computer Science, Hardware & Architecture

Hardware-Based Malware Detection Using Low-Level Architectural Features

Meltem Ozsoy et al.

IEEE TRANSACTIONS ON COMPUTERS (2016)

Article Computer Science, Artificial Intelligence

An experimental unification of reservoir computing methods

D. Verstraeten et al.

NEURAL NETWORKS (2007)