{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T12:19:34Z","timestamp":1763468374243},"reference-count":53,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,10]]},"DOI":"10.1109\/micro.2016.7783740","type":"proceedings-article","created":{"date-parts":[[2016,12,19]],"date-time":"2016-12-19T17:11:05Z","timestamp":1482167465000},"page":"1-13","source":"Crossref","is-referenced-by-count":33,"title":["Quantifying and improving the efficiency of hardware-based mobile malware detectors"],"prefix":"10.1109","author":[{"given":"Mikhail","family":"Kazdagli","sequence":"first","affiliation":[]},{"given":"Vijay Janapa","family":"Reddi","sequence":"additional","affiliation":[]},{"given":"Mohit","family":"Tiwari","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046779"},{"year":"0","key":"ref38","article-title":"Applock vulnerability"},{"year":"0","key":"ref33","article-title":"Universal android rooting procedure (rage method)"},{"year":"0","key":"ref32","article-title":"Malware database"},{"year":"0","key":"ref31","article-title":"Malware database"},{"year":"0","key":"ref30","article-title":"Geinimi malware"},{"year":"0","key":"ref37","article-title":"Evernote patches"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-05149-9_9"},{"year":"0","key":"ref35","article-title":"Exploid"},{"year":"0","key":"ref34","article-title":"Gingerbreak apk root"},{"year":"0","key":"ref28","article-title":"Mobile malware database"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.16"},{"year":"0","key":"ref29","article-title":"Obad malware"},{"year":"0","key":"ref2","article-title":"Vulnerable & aggressive adware"},{"key":"ref1","article-title":"Phishing on mobile devices","author":"felt","year":"2011","journal-title":"W2SP"},{"key":"ref20","article-title":"Seurat: A pointillist approach to anomaly detection","author":"xie","year":"2004","journal-title":"The International Symposium on Research in Attacks Intrusions and Defenses (RAID)"},{"key":"ref22","first-page":"86","article-title":"Droidapiminer: Mining api-level features for robust malware detection in android","author":"aafer","year":"2013","journal-title":"Security and Privacy in Communication Networks - 9th International ICST Conference SecureComm 2013"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/2338965.2336768"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/2487726.2488370"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23269"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.10"},{"key":"ref25","article-title":"Innovative technology for cpu based attestation and sealing","author":"anati","year":"2013","journal-title":"ser HASP' 13"},{"year":"0","key":"ref50","article-title":"Slow loris attack"},{"year":"0","key":"ref51","article-title":"Dissecting android's bouncer"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.25"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382223"},{"key":"ref10","article-title":"Exploiting the dram rowhammer bug to gain kernel privileges","author":"seaborn","year":"2015","journal-title":"BlackHat"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813708"},{"year":"0","key":"ref40","article-title":"Android rat malware"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-30806-7_9"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/2716260"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2009.06.008"},{"key":"ref15","doi-asserted-by":"crossref","DOI":"10.14722\/ndss.2016.23115","article-title":"Automatically evading classifiers a case study on pdf malware classifiers","author":"xu","year":"2016","journal-title":"Network and Distributed Systems Symp"},{"year":"0","key":"ref16","article-title":"Trendlabs a look at google bouncer"},{"key":"ref17","article-title":"Taintdroid: An information-flow tracking system for realtime privacy monitoring on smartphones","author":"enck","year":"2010","journal-title":"Proceedings of the 9th USENIX Conference on Operating Systems Design and Implementation Ser OSDI'10"},{"key":"ref18","doi-asserted-by":"crossref","DOI":"10.1145\/2594291.2594299","article-title":"Flowdroid: Precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for android apps","author":"arzt","year":"2014","journal-title":"Proceedings of the ACM SIGPLAN Conference on Programming Language Design and Implementation"},{"key":"ref19","first-page":"1115","article-title":"When gossip is good: Distributed probabilistic inference for detection of slow network intrusions","author":"dash","year":"2006","journal-title":"Proceedings of the 21st National Conference on Artificial Intelligence-Volume 1 AAAI'06"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ICTAI.2013.53"},{"year":"0","key":"ref3","article-title":"Master key vulnerability"},{"key":"ref6","first-page":"109","article-title":"Unsupervised anomaly-based malware detection using hardware features","author":"tang","year":"2014","journal-title":"Research in Attacks Intrusions and Defenses - 17th International Symposium RAID 2014"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/2485922.2485970"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-26362-5_1"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2015.7056070"},{"key":"ref49","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/8291.001.0001","author":"schapire","year":"2012","journal-title":"Boosting Foundations and Algorithms"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"361","DOI":"10.1145\/2678373.2665726","article-title":"Flipping bits in memory without accessing them: An experimental study of dram disturbance errors","author":"kim","year":"2014","journal-title":"Proceeding of the 41st Annual International Symposium on Computer Architecuture ser ISCA '14"},{"year":"0","key":"ref46","article-title":"Record and replay for android"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1145\/2491411.2491450"},{"key":"ref48","article-title":"X-means: Extending k-means with efficient estimation of the number of clusters","author":"pelleg","year":"2000","journal-title":"Proc 7th Int Conf Machine Learning"},{"year":"0","key":"ref47","article-title":"Jitbit macro recorder"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/2611765.2611767"},{"year":"0","key":"ref41","article-title":"Mobile bitcoin miner"},{"year":"0","key":"ref44","article-title":"Ui\/application exerciser monkey"},{"year":"0","key":"ref43","article-title":"http:\/\/developer.android.com\/tools\/help\/proguard.html"}],"event":{"name":"2016 49th Annual IEEE\/ACM International Symposium on Microarchitecture (MICRO)","start":{"date-parts":[[2016,10,15]]},"location":"Taipei, Taiwan","end":{"date-parts":[[2016,10,19]]}},"container-title":["2016 49th Annual IEEE\/ACM International Symposium on Microarchitecture (MICRO)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7777315\/7783693\/07783740.pdf?arnumber=7783740","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,18]],"date-time":"2022-07-18T20:36:31Z","timestamp":1658176591000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7783740\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,10]]},"references-count":53,"URL":"https:\/\/doi.org\/10.1109\/micro.2016.7783740","relation":{},"subject":[],"published":{"date-parts":[[2016,10]]}}}