{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T18:23:31Z","timestamp":1740162211109,"version":"3.37.3"},"reference-count":35,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2020,6,22]],"date-time":"2020-06-22T00:00:00Z","timestamp":1592784000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,6,22]],"date-time":"2020-06-22T00:00:00Z","timestamp":1592784000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Cryptogr Eng"],"published-print":{"date-parts":[[2020,11]]},"DOI":"10.1007\/s13389-020-00232-9","type":"journal-article","created":{"date-parts":[[2020,6,22]],"date-time":"2020-06-22T20:03:49Z","timestamp":1592856229000},"page":"289-303","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Improving accuracy of HPC-based malware classification for embedded platforms using gradient descent optimization"],"prefix":"10.1007","volume":"10","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3338-2944","authenticated-orcid":false,"given":"Manaar","family":"Alam","sequence":"first","affiliation":[]},{"given":"Debdeep","family":"Mukhopadhyay","sequence":"additional","affiliation":[]},{"given":"Sai Praveen","family":"Kadiyala","sequence":"additional","affiliation":[]},{"given":"Siew-Kei","family":"Lam","sequence":"additional","affiliation":[]},{"given":"Thambipillai","family":"Srikanthan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,6,22]]},"reference":[{"issue":"2","key":"232_CR1","doi-asserted-by":"publisher","first-page":"289","DOI":"10.1109\/TIFS.2015.2491300","volume":"11","author":"S Das","year":"2016","unstructured":"Das, S., Liu, Y., Zhang, W., Chandramohan, M.: Semantics-based online malware detection: towards efficient real-time protection against malware. IEEE Trans. Inf. For. Secur. 11(2), 289\u2013302 (2016)","journal-title":"IEEE Trans. Inf. For. Secur."},{"key":"232_CR2","doi-asserted-by":"crossref","unstructured":"Chandramohan, M., Tan, H. B. K., Briand, L.C., Shar, L.K., Padmanabhuni, B. M.: A scalable approach for malware detection through bounded feature space behavior modeling. In: 2013 28th IEEE\/ACM International Conference on Automated Software Engineering, ASE 2013, Silicon Valley, CA, USA, November 11\u201315, 2013, pp. 312\u2013322, (2013)","DOI":"10.1109\/ASE.2013.6693090"},{"issue":"4","key":"232_CR3","doi-asserted-by":"publisher","first-page":"381","DOI":"10.1109\/TDSC.2008.69","volume":"7","author":"F Maggi","year":"2010","unstructured":"Maggi, F., Matteucci, M., Zanero, S.: Detecting intrusions through system call sequence and argument analysis. IEEE Trans. Dependable Secure Comput. 7(4), 381\u2013395 (2010)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"232_CR4","doi-asserted-by":"crossref","unstructured":"Bhattacharya, S., Mukhopadhyay, D.: Who watches the watchmen?: Utilizing performance monitors for compromising keys of RSA on intel platforms. In: Cryptographic Hardware and Embedded Systems\u2013CHES 2015\u201317th International Workshop, Saint-Malo, France, September 13\u201316, 2015, Proceedings, pp. 248\u2013266, (2015)","DOI":"10.1007\/978-3-662-48324-4_13"},{"issue":"1","key":"232_CR5","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1145\/3156015","volume":"21","author":"S Bhattacharya","year":"2018","unstructured":"Bhattacharya, S., Mukhopadhyay, D.: Utilizing performance counters for compromising public key ciphers. ACM Trans. Priv. Secur. 21(1), 51\u2013531 (2018)","journal-title":"ACM Trans. Priv. Secur."},{"key":"232_CR6","first-page":"564","volume":"2017","author":"M Alam","year":"2017","unstructured":"Alam, M., Bhattacharya, S., Mukhopadhyay, D., Bhattacharya, S.: Performance counters to rescue: a machine learning based safeguard against micro-architectural side-channel-attacks. IACR Cryptol. ePrint Arch. 2017, 564 (2017)","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"232_CR7","unstructured":"Alam, M., Bhattacharya, S., Mukhopadhyay, D., Chattopadhyay, A. P.: RAPPER: ransomware prevention via performance counters. CoRR, abs\/1802.03909, (2018)"},{"key":"232_CR8","doi-asserted-by":"crossref","unstructured":"Alam, M., Bhattacharya, S., Dutta, S., Sinha, S., Mukhopadhyay, D., Chattopadhyay, A.: RATAFIA: ransomware analysis using time and frequency informed autoencoders. In: IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2019, McLean, VA, USA, May 5\u201310, 2019, pp. 218\u2013227, (2019)","DOI":"10.1109\/HST.2019.8740837"},{"key":"232_CR9","doi-asserted-by":"crossref","unstructured":"Malone, C., Zahran, M., Karri, R.: Are hardware performance counters a cost effective way for integrity checking of programs. In: Proceedings of the sixth ACM workshop on Scalable trusted computing, STC@CCS 2011, Chicago, Illinois, USA, October 17, 2011, pp. 71\u201376, (2011)","DOI":"10.1145\/2046582.2046596"},{"key":"232_CR10","doi-asserted-by":"crossref","unstructured":"Demme, J., Maycock, M., Schmitz, J., Tang, A., Waksman, A., Sethumadhavan, S., Stolfo, S. J.: On the feasibility of online malware detection with performance counters. In: The 40th Annual International Symposium on Computer Architecture, ISCA\u201913, Tel-Aviv, Israel, June 23-27, 2013, pp. 559\u2013570, (2013)","DOI":"10.1145\/2485922.2485970"},{"key":"232_CR11","doi-asserted-by":"crossref","unstructured":"Wang, X., Karri, R.: Numchecker: detecting kernel control-flow modifying rootkits by using hardware performance counters. In: The 50th Annual Design Automation Conference 2013, DAC \u201913, Austin, TX, USA, May 29\u2013June 07, 2013, pp. 79:1\u201379:7, (2013)","DOI":"10.1145\/2463209.2488831"},{"issue":"3","key":"232_CR12","doi-asserted-by":"publisher","first-page":"485","DOI":"10.1109\/TCAD.2015.2474374","volume":"35","author":"X Wang","year":"2016","unstructured":"Wang, X., Karri, R.: Reusing hardware performance counters to detect and identify kernel control-flow modifying rootkits. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 35(3), 485\u2013498 (2016)","journal-title":"IEEE Trans. Comput. Aided Des. Integr. Circuits Syst."},{"key":"232_CR13","doi-asserted-by":"crossref","unstructured":"Gascon, H., Yamaguchi, F., Arp, D., Rieck, K.: Structural detection of android malware using embedded call graphs. In: AISec\u201913, Proceedings of the 2013 ACM Workshop on Artificial Intelligence and Security, Co-located with CCS 2013, Berlin, Germany, November 4, 2013, pp. 45\u201354, (2013)","DOI":"10.1145\/2517312.2517315"},{"key":"232_CR14","doi-asserted-by":"crossref","unstructured":"Tang, A., Sethumadhavan, S., Stolfo, S. J.: Unsupervised anomaly-based malware detection using hardware features. In: Research in Attacks, Intrusions and Defenses\u201317th International Symposium, RAID 2014, Gothenburg, Sweden, September 17-19, 2014. Proceedings, pp. 109\u2013129, (2014)","DOI":"10.1007\/978-3-319-11379-1_6"},{"issue":"1","key":"232_CR15","first-page":"3:1","volume":"13","author":"X Wang","year":"2016","unstructured":"Wang, X., Chai, S., Isnardi, M.A., Lim, S., Karri, R.: Hardware performance counter-based malware identification and detection with adaptive compressive sensing. ACM Trans. Architect. Code Optim. 13(1), 3:1\u20133:23 (2016)","journal-title":"ACM Trans. Architect. Code Optim."},{"key":"232_CR16","doi-asserted-by":"crossref","unstructured":"Dou, Y., Zeng, K. C., Yang, Y., Yao, D. D.: Madecr: correlation-based malware detection for cognitive radio. In: 2015 IEEE Conference on Computer Communications, INFOCOM 2015, Kowloon, Hong Kong, April 26\u2013May 1, 2015, pp. 639\u2013647, (2015)","DOI":"10.1109\/INFOCOM.2015.7218432"},{"key":"232_CR17","first-page":"1152","volume":"2016","author":"DB Roy","year":"2016","unstructured":"Roy, D.B., Bhasin, S., Patranabis, S., Mukhopadhyay, D., Guilley, S.: What lies ahead: Extending TVLA testing methodology towards success rate. IACR Crypt ePrint Arch. 2016, 1152 (2016)","journal-title":"IACR Crypt ePrint Arch."},{"key":"232_CR18","doi-asserted-by":"crossref","unstructured":"Abadi, M., Budiu, M., Erlingsson, U., Ligatti, J.: Control-flow integrity. In: Proceedings of the 12th ACM Conference on Computer and Communications Security, CCS 2005, Alexandria, VA, USA, November 7\u201311, 2005, pp. 340\u2013353, (2005)","DOI":"10.1145\/1102120.1102165"},{"key":"232_CR19","unstructured":"Kiriansky, V., Bruening, D., Amarasinghe, S. P.: Secure execution via program shepherding. In: Proceedings of the 11th USENIX Security Symposium, San Francisco, CA, USA, August 5-9, 2002, pp. 191\u2013206, (2002)"},{"issue":"7","key":"232_CR20","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1109\/2.869367","volume":"33","author":"JL Henning","year":"2000","unstructured":"Henning, J.L.: SPEC CPU2000: measuring CPU performance in the new millennium. IEEE Comput. 33(7), 28\u201335 (2000)","journal-title":"IEEE Comput."},{"key":"232_CR21","unstructured":"De\u00a0Clercq, R., Verbauwhede, Ingrid.: a survey of hardware-based control flow integrity (CFI). CoRR, abs\/1706.07257, (2017)"},{"key":"232_CR22","unstructured":"Roberts, J.-M.: VirusShare, url:https:\/\/virusshare.com\/"},{"key":"232_CR23","unstructured":"Georgia Tech Information Security Center. Open malware, url:http:\/\/www.offensivecomputing.net\/"},{"key":"232_CR24","unstructured":"Wang, X., Yu, H.: How to break MD5 and other hash functions. In: Advances in Cryptology\u2013EUROCRYPT 2005, 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22\u201326, 2005, Proceedings, pp. 19\u201335, (2005)"},{"key":"232_CR25","doi-asserted-by":"crossref","unstructured":"Checkoway, S., Davi, L., Dmitrienko, A., Sadeghi, A.-R., Shacham, H., Winandy, M.: Return-oriented programming without returns. In: Proceedings of the 17th ACM Conference on Computer and Communications Security, CCS 2010, Chicago, Illinois, USA, October 4-8, 2010, pp. 559\u2013572, (2010)","DOI":"10.1145\/1866307.1866370"},{"key":"232_CR26","unstructured":"Qemu, F. B.: A fast and portable dynamic translator. In: Proceedings of the FREENIX Track: 2005 USENIX Annual Technical Conference, April 10\u201315, 2005, Anaheim, CA, USA, pp. 41\u201346, (2005)"},{"key":"232_CR27","unstructured":"Guarnieri, C., Tanasi, A., Bremer, J., Schloesser, M.: The cuckoo sandbox, url: https:\/\/cuckoosandbox.org\/, (2012)"},{"key":"232_CR28","unstructured":"Hara, Y., Tomiyama, H., Honda, S., Takada, H., Ishii, K.: Chstone: a benchmark program suite for practical c-based high-level synthesis. In: International Symposium on Circuits and Systems (ISCAS 2008), 18\u201321 May 2008, Sheraton Seattle Hotel, Seattle, Washington, USA, pp. 1192\u20131195, (2008)"},{"key":"232_CR29","unstructured":"Smith, B., Grehan, R., Yager, T.: and DC Niemi. A unix benchmark suite. Technical report, Byte-unixbench, (2011)"},{"key":"232_CR30","unstructured":"McVoy, L. W., Staelin, C.: lmbench: portable tools for performance analysis. In: Proceedings of the USENIX Annual Technical Conference, San Diego, California, USA, January 22\u201326, 1996, pp. 279\u2013294, (1996)"},{"key":"232_CR31","unstructured":"Guthaus, M. R., Ringenberg, J. S., Ernst, D., Austin, T. M., Mudge, T., Brown, R. B.: Mibench: a free, commercially representative embedded benchmark suite. In: IEEE International Workshop on Workload Characterization, 2001. WWC-4. 2001, pp. 3\u201314, (2001)"},{"key":"232_CR32","doi-asserted-by":"crossref","unstructured":"Patel, N., Sasan, A., Homayoun, H.: Analyzing hardware based malware detectors. In: Proceedings of the 54th Annual Design Automation Conference, DAC 2017, Austin, TX, USA, June 18\u201322, 2017, pp. 25:1\u201325:6, (2017)","DOI":"10.1145\/3061639.3062202"},{"issue":"11","key":"232_CR33","doi-asserted-by":"publisher","first-page":"3332","DOI":"10.1109\/TC.2016.2540634","volume":"65","author":"M Ozsoy","year":"2016","unstructured":"Ozsoy, M., Khasawneh, K.N., Donovick, C., Gorelik, I., Abu-Ghazaleh, N.B., Ponomarev, D.: Hardware-based malware detection using low-level architectural features. IEEE Trans. Comput. 65(11), 3332\u20133344 (2016)","journal-title":"IEEE Trans. Comput."},{"key":"232_CR34","doi-asserted-by":"crossref","unstructured":"Wang, X., Konstantinou, C., Maniatakos, M., Karri, R.: Confirm: Detecting firmware modifications in embedded systems using hardware performance counters. In: Proceedings of the IEEE\/ACM International Conference on Computer-Aided Design, ICCAD 2015, Austin, TX, USA, November 2\u20136, 2015, pp. 544\u2013551, (2015)","DOI":"10.1109\/ICCAD.2015.7372617"},{"key":"232_CR35","doi-asserted-by":"crossref","unstructured":"Elnaggar, R., Chakrabarty, K., Tahoori, M. B.: Run-time hardware trojan detection using performance counters. In: IEEE International Test Conference, ITC 2017, Fort Worth, TX, USA, October 31\u2013Nov 2, 2017, pp. 1\u201310, (2017)","DOI":"10.1109\/TEST.2017.8242063"}],"container-title":["Journal of Cryptographic Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13389-020-00232-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s13389-020-00232-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13389-020-00232-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,6,21]],"date-time":"2021-06-21T23:08:08Z","timestamp":1624316888000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s13389-020-00232-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,6,22]]},"references-count":35,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2020,11]]}},"alternative-id":["232"],"URL":"https:\/\/doi.org\/10.1007\/s13389-020-00232-9","relation":{},"ISSN":["2190-8508","2190-8516"],"issn-type":[{"type":"print","value":"2190-8508"},{"type":"electronic","value":"2190-8516"}],"subject":[],"published":{"date-parts":[[2020,6,22]]},"assertion":[{"value":"31 January 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 May 2020","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 June 2020","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}