Related references
Note: Only part of the references are listed.Explainable Machine Learning for Intrusion Detection via Hardware Performance Counters
Abraham Peedikayil Kuruvila et al.
IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS (2022)
Why We Need a Theory of Maliciousness: Hardware Performance Counters in Security
Marcus Botacin et al.
INFORMATION SECURITY, ISC 2022 (2022)
Securing IoT Devices Using Dynamic Power Management: Machine Learning Approach
Nikhil Chawla et al.
IEEE INTERNET OF THINGS JOURNAL (2021)
Peeking into the Gray Area of Mobile World: An Empirical Study of Unlabeled Android Apps
Sen Chen et al.
2021 IEEE 32ND INTERNATIONAL SYMPOSIUM ON SOFTWARE RELIABILITY ENGINEERING (ISSRE 2021) (2021)
Towards Improving the Trustworthiness of Hardware based Malware Detector using Online Uncertainty Estimation
Harshit Kumar et al.
2021 58TH ACM/IEEE DESIGN AUTOMATION CONFERENCE (DAC) (2021)
Does Every Second Count? Time-based Evolution of Malware Behavior in Sandboxes
Alexander Kuechler et al.
28TH ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2021) (2021)
EnsembleHMD: Accurate Hardware Malware Detectors with Specialized Ensemble Classifiers
Khaled N. Khasawneh et al.
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2020)
Separability and geometry of object manifolds in deep neural networks
Uri Cohen et al.
NATURE COMMUNICATIONS (2020)
Hardware Performance Counter-Based Fine-Grained Malware Detection
Sai Praveen Kadiyala et al.
ACM TRANSACTIONS ON EMBEDDED COMPUTING SYSTEMS (2020)
AVCLASS2: Massive Malware Tag Extraction from AV Labels
Silvia Sebastian et al.
36TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2020) (2020)
Plundervolt: Software-based Fault Injection Attacks against Intel SGX
Kit Murdock et al.
2020 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2020) (2020)
Analyzing the Efficiency of Machine Learning Classifiers in Hardware-based Malware Detectors
Abraham Peedikayil Kuruvila et al.
2020 IEEE COMPUTER SOCIETY ANNUAL SYMPOSIUM ON VLSI (ISVLSI 2020) (2020)
Malware Detection Using Power Consumption and Network Traffic Data
Jarilyn M. Hernandez Jimenez et al.
2019 2ND INTERNATIONAL CONFERENCE ON DATA INTELLIGENCE AND SECURITY (ICDIS 2019) (2019)
The AV says: Your Hardware Definitions Were Updated!
Marcus Botacin et al.
2019 14TH INTERNATIONAL SYMPOSIUM ON RECONFIGURABLE COMMUNICATION-CENTRIC SYSTEMS-ON-CHIP (RECOSOC 2019) (2019)
SoK: The Challenges, Pitfalls, and Perils of Using Hardware Performance Counters for Security
Sanjeev Das et al.
2019 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2019) (2019)
Robust Intelligent Malware Detection Using Deep Learning
R. Vinayakumar et al.
IEEE ACCESS (2019)
MADAM: Effective and Efficient Behavior-based Android Malware Detection and Prevention
Andrea Saracino et al.
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2018)
Classification and Geometry of General Perceptual Manifolds
SueYeon Chung et al.
PHYSICAL REVIEW X (2018)
Towards Malware Detection via CPU Power Consumption: Data Collection Design and Analytics
Robert A. Bridges et al.
2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE) (2018)
Understanding Android App Piggybacking: A Systematic Study of Malicious Code Grafting
Li Li et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2017)
Analyzing Hardware Based Malware Detectors
Nisarg Patel et al.
PROCEEDINGS OF THE 2017 54TH ACM/EDAC/IEEE DESIGN AUTOMATION CONFERENCE (DAC) (2017)
Drebin: Effective and Explainable Detection of Android Malware in Your Pocket
Daniel Arp et al.
21ST ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2014) (2014)
Untangling invariant object recognition
James J. DiCarlo et al.
TRENDS IN COGNITIVE SCIENCES (2007)