{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,20]],"date-time":"2026-04-20T10:29:54Z","timestamp":1776680994609,"version":"3.51.2"},"reference-count":25,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,4,15]],"date-time":"2021-04-15T00:00:00Z","timestamp":1618444800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,4,15]],"date-time":"2021-04-15T00:00:00Z","timestamp":1618444800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,4,15]],"date-time":"2021-04-15T00:00:00Z","timestamp":1618444800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,4,15]]},"DOI":"10.1109\/syscon48628.2021.9447078","type":"proceedings-article","created":{"date-parts":[[2021,6,9]],"date-time":"2021-06-09T21:20:08Z","timestamp":1623273608000},"page":"1-8","source":"Crossref","is-referenced-by-count":9,"title":["Real-Time Edge Processing Detection of Malicious Attacks Using Machine Learning and Processor Core Events"],"prefix":"10.1109","author":[{"given":"Rob","family":"Oshana","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Mitchell A.","family":"Thornton","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Eric C.","family":"Larson","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Xavier","family":"Roumegue","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/2948618.2948620"},{"key":"ref11","article-title":"Performance Counters to Rescue: A Machine Learning based safeguard against Micro-architectural Side-Channel Attacks","author":"alam","year":"2017","journal-title":"Cryptology-eprint-archive"},{"key":"ref12","article-title":"Detecting Spectre and Meltdown using Hardware Performance Counters","author":"pierce","year":"2018","journal-title":"EndGame BLOG"},{"key":"ref13","article-title":"These are Not Your Grand Daddy's CPU Performance Counters","author":"herath","year":"2015","journal-title":"Proc Blackhat Conf"},{"key":"ref14","first-page":"7","article-title":"Capturing 0day Exploits with PERFectly Placed Hardware Traps","author":"pierce","year":"2016","journal-title":"Proc Blackhat Conf"},{"key":"ref15","first-page":"75","article-title":"Detecting Spectre Attacks by Identifying Cache Side-Channel Attacks using Machine Learning","author":"depoix","year":"2018","journal-title":"proc 4th Wiesbaden Workshop on Advanced Microkernel Operating Systems(WAMOS)"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICRITO.2017.8342471"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2018.2141022"},{"key":"ref18","year":"0","journal-title":"ARM Ltd Technical Reference Manual ARM&#x00AE; Cortex&#x00AE; -A72 MPCore Processor"},{"key":"ref19","article-title":"iMX 8 Applications Processors Family Fact Sheet","year":"2016","journal-title":"NXP Semiconductor"},{"key":"ref4","article-title":"A Survey of Cyber Security Countermeasures Using Hardware Performance Counters","author":"foreman","year":"2018","journal-title":"arXiv 1807 10868v1"},{"key":"ref3","first-page":"109129","article-title":"Unsupervised Anomalybased Malware Detection using Hardware Features","author":"tang","year":"2014","journal-title":"Int Symposium on Research in Attacks Intrusions and Defenses"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/2103799.2103807"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00021"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2016.7783740"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2015.7056070"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/2485922.2485970"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/2857055"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2018.2141022"},{"key":"ref20","first-page":"4221","article-title":"A Comparison of Multiclass Support Vector Machine Algorithms","author":"hao","year":"2006","journal-title":"Proc Int Conf on Machine Learning and Cybernetics"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ICAC3.2017.8318748"},{"key":"ref21","first-page":"2825","article-title":"Scikit-learn: Machine learning in Python","author":"pedregosa","year":"2011","journal-title":"Journal of Machine Learning Research"},{"key":"ref24","first-page":"15191535","article-title":"Performance and efficiency: recent advances in supervised learning","volume":"87","author":"ma","year":"1999","journal-title":"Proceedings of the IEEE"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/R10-HTC.2017.8288898"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1023\/A:1010933404324"}],"event":{"name":"2021 IEEE International Systems Conference (SysCon)","location":"Vancouver, BC, Canada","start":{"date-parts":[[2021,4,15]]},"end":{"date-parts":[[2021,5,15]]}},"container-title":["2021 IEEE International Systems Conference (SysCon)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9447020\/9447051\/09447078.pdf?arnumber=9447078","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T15:42:21Z","timestamp":1652197341000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9447078\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,4,15]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/syscon48628.2021.9447078","relation":{},"subject":[],"published":{"date-parts":[[2021,4,15]]}}}