{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T04:58:07Z","timestamp":1725771487107},"publisher-location":"New York, NY, USA","reference-count":26,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,6,2]],"date-time":"2019-06-02T00:00:00Z","timestamp":1559433600000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,6,2]]},"DOI":"10.1145\/3316781.3317762","type":"proceedings-article","created":{"date-parts":[[2019,5,23]],"date-time":"2019-05-23T18:07:13Z","timestamp":1558634833000},"page":"1-6","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":30,"title":["Adversarial Attack on Microarchitectural Events based Malware Detectors"],"prefix":"10.1145","author":[{"given":"Sai Manoj Pudukotai","family":"Dinakarrao","sequence":"first","affiliation":[{"name":"George Mason University, Fairfax, VA, USA"}]},{"given":"Sairaj","family":"Amberkar","sequence":"additional","affiliation":[{"name":"George Mason University, Fairfax, VA, USA"}]},{"given":"Sahil","family":"Bhat","sequence":"additional","affiliation":[{"name":"George Mason University, Fairfax, VA, USA"}]},{"given":"Abhijitt","family":"Dhavlle","sequence":"additional","affiliation":[{"name":"George Mason University, Fairfax, VA, USA"}]},{"given":"Hossein","family":"Sayadi","sequence":"additional","affiliation":[{"name":"George Mason University, Fairfax, VA, USA"}]},{"given":"Avesta","family":"Sasan","sequence":"additional","affiliation":[{"name":"George Mason University, Fairfax, VA, USA"}]},{"given":"Houman","family":"Homayoun","sequence":"additional","affiliation":[{"name":"George Mason University, Fairfax, VA, USA"}]},{"given":"Setareh","family":"Rafatirad","sequence":"additional","affiliation":[{"name":"George Mason University, Fairfax, VA, USA"}]}],"member":"320","published-online":{"date-parts":[[2019,6,2]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2019. VirusShare Team. www.virusshare.com Last accessed: 04-May-2019. 2019. VirusShare Team. www.virusshare.com Last accessed: 04-May-2019."},{"key":"e_1_3_2_1_2_1","unstructured":"2019. Virustotal intelligence service. www.virustotal.com\/intelligence Last accessed: 04-May-2019. 2019. Virustotal intelligence service. www.virustotal.com\/intelligence Last accessed: 04-May-2019."},{"volume-title":"Int. Conf. on Computer and Knowledge Engineering.","author":"Bahador M. B.","key":"e_1_3_2_1_3_1","unstructured":"M. B. Bahador , M. Abadi , and A. Tajoddin . 2014. HPCMalHunter: Behavioral malware detection using hardware performance counters and singular value decomposition . In Int. Conf. on Computer and Knowledge Engineering. M. B. Bahador, M. Abadi, and A. Tajoddin. 2014. HPCMalHunter: Behavioral malware detection using hardware performance counters and singular value decomposition. In Int. Conf. on Computer and Knowledge Engineering."},{"volume-title":"Advances and Throwbacks in Hardware-assisted Security: Special Session. In Int. Conf. on CASES.","author":"Brasser F.","key":"e_1_3_2_1_4_1","unstructured":"F. Brasser and et al. 2018 . Advances and Throwbacks in Hardware-assisted Security: Special Session. In Int. Conf. on CASES. F. Brasser and et al. 2018. Advances and Throwbacks in Hardware-assisted Security: Special Session. In Int. Conf. on CASES."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508148.2485970"},{"key":"e_1_3_2_1_6_1","unstructured":"S. Dinakarrao and etal 2019. Lightweight Node-level Malware Detection and Network-level Malware Confinement in IoT Networks. In Design Automation and Test Con. in Europe. S. Dinakarrao and et al. 2019. Lightweight Node-level Malware Detection and Network-level Malware Confinement in IoT Networks. In Design Automation and Test Con. in Europe."},{"volume-title":"Anomaly Detection for Malware Identification using Hardware Performance Counters. CoRR abs\/1508.07482","year":"2015","author":"Garcia-Serrano A.","key":"e_1_3_2_1_7_1","unstructured":"A. Garcia-Serrano . 2015. Anomaly Detection for Malware Identification using Hardware Performance Counters. CoRR abs\/1508.07482 ( 2015 ). A. Garcia-Serrano. 2015. Anomaly Detection for Malware Identification using Hardware Performance Counters. CoRR abs\/1508.07482 (2015)."},{"volume-title":"Explaining and Harnessing Adversarial Examples. In International Conference on Learning Representations.","author":"Goodfellow I.","key":"e_1_3_2_1_8_1","unstructured":"I. Goodfellow , J. Shlens , and C. Szegedy . 2015 . Explaining and Harnessing Adversarial Examples. In International Conference on Learning Representations. I. Goodfellow, J. Shlens, and C. Szegedy. 2015. Explaining and Harnessing Adversarial Examples. In International Conference on Learning Representations."},{"key":"e_1_3_2_1_9_1","unstructured":"M. R. Guthaus and etal 2001. MiBench: A free commercially representative embedded benchmark suite. In IEEE Int. W. on Workload Characterization. M. R. Guthaus and et al. 2001. MiBench: A free commercially representative embedded benchmark suite. In IEEE Int. W. on Workload Characterization."},{"key":"e_1_3_2_1_10_1","unstructured":"A. Huang and etal 2018. Adversarial Deep Learning for Robust Detection of Binary Encoded Malware. CoRR abs\/1801.02950 (2018). A. Huang and et al. 2018. Adversarial Deep Learning for Robust Detection of Binary Encoded Malware. CoRR abs\/1801.02950 (2018)."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-008-0086-0"},{"key":"e_1_3_2_1_12_1","first-page":"1","article-title":"SensorNet: A Scalable and Low-Power Deep Convolutional Neural Network for Multimodal Data Classification","author":"Jafari A.","year":"2019","unstructured":"A. Jafari and 2019 . SensorNet: A Scalable and Low-Power Deep Convolutional Neural Network for Multimodal Data Classification . IEEE Tran. on Circuits and Systems I 66, 1 (Jan 2019), 274--287. A. Jafari and et al. 2019. SensorNet: A Scalable and Low-Power Deep Convolutional Neural Network for Multimodal Data Classification. IEEE Tran. on Circuits and Systems I 66, 1 (Jan 2019), 274--287.","journal-title":"IEEE Tran. on Circuits and Systems"},{"volume-title":"Advanced Threat Defense and Targeted Attack Risk Migration. White Paper","year":"2017","key":"e_1_3_2_1_13_1","unstructured":"Kaspersky. 2017. Advanced Threat Defense and Targeted Attack Risk Migration. White Paper ( 2017 ), 1--12. https:\/\/media.kaspersky.com\/en\/business-security\/enterprise\/KL_KATA_Whitepaper_OG.pdf. Kaspersky. 2017. Advanced Threat Defense and Targeted Attack Risk Migration. White Paper (2017), 1--12. https:\/\/media.kaspersky.com\/en\/business-security\/enterprise\/KL_KATA_Whitepaper_OG.pdf."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3123939.3123972"},{"key":"e_1_3_2_1_15_1","unstructured":"K. Khasawneh and etal 2018. EnsembleHMD: Accurate Hardware Malware Detectors with Specialized Ensemble Classifiers. IEEE Trans. on Dependable and Secure Computing (2018). K. Khasawneh and et al. 2018. EnsembleHMD: Accurate Hardware Malware Detectors with Specialized Ensemble Classifiers. IEEE Trans. on Dependable and Secure Computing (2018)."},{"volume-title":"Energy Efficient Convolutional Neural Networks for EEG Artifact Detection. In IEEE Biomedical Circuits and Systems Conf.","author":"Khatwani M.","key":"e_1_3_2_1_16_1","unstructured":"M. Khatwani and et al. 2018 . Energy Efficient Convolutional Neural Networks for EEG Artifact Detection. In IEEE Biomedical Circuits and Systems Conf. M. Khatwani and et al. 2018. Energy Efficient Convolutional Neural Networks for EEG Artifact Detection. In IEEE Biomedical Circuits and Systems Conf."},{"volume-title":"Int. Conf. on Learning Representations.","author":"Liu Y.","key":"e_1_3_2_1_17_1","unstructured":"Y. Liu , X. Chen , C. Liu , and D. Song . 2017. Delving into Transferable Adversarial Examples and Black-box Attacks . In Int. Conf. on Learning Representations. Y. Liu, X. Chen, C. Liu, and D. Song. 2017. Delving into Transferable Adversarial Examples and Black-box Attacks. In Int. Conf. on Learning Representations."},{"volume-title":"The Limitations of Deep Learning in Adversarial Settings. In IEEE European Symp. on Security and Privacy.","author":"Papernot N.","key":"e_1_3_2_1_18_1","unstructured":"N. Papernot and et al. 2016 . The Limitations of Deep Learning in Adversarial Settings. In IEEE European Symp. on Security and Privacy. N. Papernot and et al. 2016. The Limitations of Deep Learning in Adversarial Settings. In IEEE European Symp. on Security and Privacy."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3061639.3062202"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3203217.3203264"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3195970.3196047"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"crossref","unstructured":"H. Sayadi and etal 2019. 2SMaRT: A Two-Stage Machine Learning-Based Approach for Run-Time Specialized Hardware-Assisted Malware Detection. In Design Automation and Test Con. in Europe. H. Sayadi and et al. 2019. 2SMaRT: A Two-Stage Machine Learning-Based Approach for Run-Time Specialized Hardware-Assisted Malware Detection. In Design Automation and Test Con. in Europe.","DOI":"10.23919\/DATE.2019.8715080"},{"volume-title":"Intriguing Properties of Neural Networks. In Int. Conf. on Learning Representations.","author":"Szegedy C.","key":"e_1_3_2_1_23_1","unstructured":"C. Szegedy and et al. 2014 . Intriguing Properties of Neural Networks. In Int. Conf. on Learning Representations. C. Szegedy and et al. 2014. Intriguing Properties of Neural Networks. In Int. Conf. on Learning Representations."},{"volume-title":"Unsupervised Anomaly-Based Malware Detection Using Hardware Features. In RAID Conference.","author":"Tang A.","key":"e_1_3_2_1_24_1","unstructured":"A. Tang , S. Sethumadhavan , and S. Stolfo . 2014 . Unsupervised Anomaly-Based Malware Detection Using Hardware Features. In RAID Conference. A. Tang, S. Sethumadhavan, and S. Stolfo. 2014. Unsupervised Anomaly-Based Malware Detection Using Hardware Features. In RAID Conference."},{"volume-title":"ConFirm: Detecting Firmware Modifications in Embedded Systems Using Hardware Performance Counters. In IEEE\/ACM Int. Conf. on Computer-Aided Design.","author":"Wang X.","key":"e_1_3_2_1_25_1","unstructured":"X. Wang and et al. 2015 . ConFirm: Detecting Firmware Modifications in Embedded Systems Using Hardware Performance Counters. In IEEE\/ACM Int. Conf. on Computer-Aided Design. X. Wang and et al. 2015. ConFirm: Detecting Firmware Modifications in Embedded Systems Using Hardware Performance Counters. In IEEE\/ACM Int. Conf. on Computer-Aided Design."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3196494.3196515"}],"event":{"name":"DAC '19: The 56th Annual Design Automation Conference 2019","sponsor":["SIGDA ACM Special Interest Group on Design Automation","IEEE-CEDA","SIGBED ACM Special Interest Group on Embedded Systems"],"location":"Las Vegas NV USA","acronym":"DAC '19"},"container-title":["Proceedings of the 56th Annual Design Automation Conference 2019"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3316781.3317762","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,6]],"date-time":"2023-01-06T03:46:50Z","timestamp":1672976810000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3316781.3317762"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,6,2]]},"references-count":26,"alternative-id":["10.1145\/3316781.3317762","10.1145\/3316781"],"URL":"https:\/\/doi.org\/10.1145\/3316781.3317762","relation":{},"subject":[],"published":{"date-parts":[[2019,6,2]]},"assertion":[{"value":"2019-06-02","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}