4.7 Article

XMD: An Expansive Hardware-Telemetry-Based Mobile Malware Detector for Endpoint Detection

Related references

Note: Only part of the references are listed.
Article Computer Science, Hardware & Architecture

Explainable Machine Learning for Intrusion Detection via Hardware Performance Counters

Abraham Peedikayil Kuruvila et al.

Summary: The article discusses the threats posed by malware and microarchitectural attacks to computing systems, leading to the use of hardware performance counter and machine learning detection strategies as a low-overhead solution. However, the decisions made by machine learning models are not understandable, hence the proposal of an explainable HPC double regression framework to address this issue.

IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS (2022)

Proceedings Paper Computer Science, Information Systems

Why We Need a Theory of Maliciousness: Hardware Performance Counters in Security

Marcus Botacin et al.

Summary: This paper clarifies the effectiveness of Hardware Performance Counters (HPCs) for malware detection by evaluating previous HPC criticism and proposes the need for a theory of maliciousness to better assess malware threats and proposed defenses.

INFORMATION SECURITY, ISC 2022 (2022)

Article Computer Science, Information Systems

Securing IoT Devices Using Dynamic Power Management: Machine Learning Approach

Nikhil Chawla et al.

Summary: The shift from cloud computing to edge computing has brought about faster response times, increased security and energy efficiency at the edge. However, this shift has also exposed IoT devices to growing vulnerabilities and malware attacks. Dynamic power management (DPM) is a key component in low-power IoT devices that can help enhance security against malware attacks.

IEEE INTERNET OF THINGS JOURNAL (2021)

Proceedings Paper Computer Science, Software Engineering

Peeking into the Gray Area of Mobile World: An Empirical Study of Unlabeled Android Apps

Sen Chen et al.

Summary: Researchers collected a large dataset of unlabeled apps from an industrial partner, utilized community-detection techniques to cluster the apps, manually analyzed common behaviors, and discovered new categories. The study also revealed that community-based techniques were not effective in clustering unlabeled apps, highlighting the importance of manual analysis in studying and understanding the characteristics of such apps. Lessons learned from real case studies and comparisons with existing research were also emphasized.

2021 IEEE 32ND INTERNATIONAL SYMPOSIUM ON SOFTWARE RELIABILITY ENGINEERING (ISSRE 2021) (2021)

Proceedings Paper Automation & Control Systems

Towards Improving the Trustworthiness of Hardware based Malware Detector using Online Uncertainty Estimation

Harshit Kumar et al.

Summary: The research proposes an ensemble-based approach to quantify the uncertainty in predictions made by machine learning models in hardware-based malware detectors when encountering unknown workloads. Testing shows that this method can effectively detect the majority of unknown workloads. Additionally, the overlapping benign and malware classes in Performance Counter-based HMD undermine its trustworthiness.

2021 58TH ACM/IEEE DESIGN AUTOMATION CONFERENCE (DAC) (2021)

Proceedings Paper Computer Science, Information Systems

Does Every Second Count? Time-based Evolution of Malware Behavior in Sandboxes

Alexander Kuechler et al.

Summary: The execution time of samples in a malware analysis sandbox is crucial in determining the scalability and quality of collected data. Most malicious behavior is observed within the first two minutes, leading to higher accuracy in machine learning classifiers. This information can assist future researchers and industrial sandboxes in optimizing their analysis systems.

28TH ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2021) (2021)

Article Computer Science, Hardware & Architecture

EnsembleHMD: Accurate Hardware Malware Detectors with Specialized Ensemble Classifiers

Khaled N. Khasawneh et al.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2020)

Article Multidisciplinary Sciences

Separability and geometry of object manifolds in deep neural networks

Uri Cohen et al.

NATURE COMMUNICATIONS (2020)

Article Computer Science, Hardware & Architecture

Hardware Performance Counter-Based Fine-Grained Malware Detection

Sai Praveen Kadiyala et al.

ACM TRANSACTIONS ON EMBEDDED COMPUTING SYSTEMS (2020)

Proceedings Paper Computer Science, Information Systems

AVCLASS2: Massive Malware Tag Extraction from AV Labels

Silvia Sebastian et al.

36TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2020) (2020)

Proceedings Paper Computer Science, Information Systems

Plundervolt: Software-based Fault Injection Attacks against Intel SGX

Kit Murdock et al.

2020 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2020) (2020)

Proceedings Paper Computer Science, Hardware & Architecture

Analyzing the Efficiency of Machine Learning Classifiers in Hardware-based Malware Detectors

Abraham Peedikayil Kuruvila et al.

2020 IEEE COMPUTER SOCIETY ANNUAL SYMPOSIUM ON VLSI (ISVLSI 2020) (2020)

Proceedings Paper Computer Science, Information Systems

Malware Detection Using Power Consumption and Network Traffic Data

Jarilyn M. Hernandez Jimenez et al.

2019 2ND INTERNATIONAL CONFERENCE ON DATA INTELLIGENCE AND SECURITY (ICDIS 2019) (2019)

Proceedings Paper Computer Science, Theory & Methods

The AV says: Your Hardware Definitions Were Updated!

Marcus Botacin et al.

2019 14TH INTERNATIONAL SYMPOSIUM ON RECONFIGURABLE COMMUNICATION-CENTRIC SYSTEMS-ON-CHIP (RECOSOC 2019) (2019)

Proceedings Paper Computer Science, Theory & Methods

SoK: The Challenges, Pitfalls, and Perils of Using Hardware Performance Counters for Security

Sanjeev Das et al.

2019 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2019) (2019)

Article Computer Science, Information Systems

Robust Intelligent Malware Detection Using Deep Learning

R. Vinayakumar et al.

IEEE ACCESS (2019)

Article Computer Science, Hardware & Architecture

MADAM: Effective and Efficient Behavior-based Android Malware Detection and Prevention

Andrea Saracino et al.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2018)

Article Physics, Multidisciplinary

Classification and Geometry of General Perceptual Manifolds

SueYeon Chung et al.

PHYSICAL REVIEW X (2018)

Proceedings Paper Computer Science, Information Systems

Towards Malware Detection via CPU Power Consumption: Data Collection Design and Analytics

Robert A. Bridges et al.

2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE) (2018)

Article Computer Science, Theory & Methods

Understanding Android App Piggybacking: A Systematic Study of Malicious Code Grafting

Li Li et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2017)

Proceedings Paper Engineering, Electrical & Electronic

Analyzing Hardware Based Malware Detectors

Nisarg Patel et al.

PROCEEDINGS OF THE 2017 54TH ACM/EDAC/IEEE DESIGN AUTOMATION CONFERENCE (DAC) (2017)

Proceedings Paper Computer Science, Information Systems

Drebin: Effective and Explainable Detection of Android Malware in Your Pocket

Daniel Arp et al.

21ST ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2014) (2014)

Review Behavioral Sciences

Untangling invariant object recognition

James J. DiCarlo et al.

TRENDS IN COGNITIVE SCIENCES (2007)