{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,8]],"date-time":"2026-01-08T02:10:08Z","timestamp":1767838208571,"version":"3.49.0"},"reference-count":52,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"7","license":[{"start":{"date-parts":[[2022,7,1]],"date-time":"2022-07-01T00:00:00Z","timestamp":1656633600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2022,7,1]],"date-time":"2022-07-01T00:00:00Z","timestamp":1656633600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,7,1]],"date-time":"2022-07-01T00:00:00Z","timestamp":1656633600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Comput.-Aided Des. Integr. Circuits Syst."],"published-print":{"date-parts":[[2022,7]]},"DOI":"10.1109\/tcad.2021.3102007","type":"journal-article","created":{"date-parts":[[2021,8,3]],"date-time":"2021-08-03T20:12:53Z","timestamp":1628021573000},"page":"2066-2079","source":"Crossref","is-referenced-by-count":21,"title":["Accurate and Robust Malware Detection: Running XGBoost on Runtime Data From Performance Counters"],"prefix":"10.1109","volume":"41","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9733-2938","authenticated-orcid":false,"given":"Rana","family":"Elnaggar","sequence":"first","affiliation":[{"name":"Department of Electrical and Computer Engineering, Duke University, Durham, NC, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4322-834X","authenticated-orcid":false,"given":"Lorenzo","family":"Servadei","sequence":"additional","affiliation":[{"name":"Power &#x0026; Sensors Systems, Infineon Technologies, Neubiberg, Germany"}]},{"given":"Shubham","family":"Mathur","sequence":"additional","affiliation":[{"name":"Duke University, Durham, NC, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4993-7860","authenticated-orcid":false,"given":"Robert","family":"Wille","sequence":"additional","affiliation":[{"name":"Institute for Integrated Circuits, Johannes Kepler University, Linz, Austria"}]},{"given":"Wolfgang","family":"Ecker","sequence":"additional","affiliation":[{"name":"Design Enabling &#x0026; Services, Infineon Technologies, Neubiberg, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4475-6435","authenticated-orcid":false,"given":"Krishnendu","family":"Chakrabarty","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, Duke University, Durham, NC, USA"}]}],"member":"263","reference":[{"key":"ref1","volume-title":"Oracle and KPMG Cloud Threat Report","year":"2019"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/s1361-3723(19)30004-1"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/2508148.2485970"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/3196494.3196515"},{"key":"ref5","first-page":"268","article-title":"Malware detection by eating a whole exe","volume-title":"Proc. Workshops AAAI","author":"Raff"},{"key":"ref6","volume-title":"CVE-2019-8285","year":"2021"},{"issue":"8","key":"ref7","first-page":"74","article-title":"Camouflage in malware: From encryption to metamorphism","volume":"12","author":"Rad","year":"2012","journal-title":"Int. J. Comput. Sci. Netw. Security"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3316781.3317883"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-11379-1_6"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/3052973.3052999"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-09420-5_2"},{"key":"ref12","volume-title":"Intel Secure Enclave","year":"2021"},{"key":"ref13","first-page":"1","article-title":"Adversarial attack on microarchitectural events based malware detectors","volume-title":"Proc. 56th Annu. Design Autom. Conf.","author":"Dinakarrao"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/MM.2002.1028477"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1049\/joe.2016.0127"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.15"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/BWCCA.2010.85"},{"key":"ref18","first-page":"5866","article-title":"Adversarial training and robustness for multiple perturbations","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Tramer"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.7551\/mitpress\/10761.003.0012"},{"key":"ref20","article-title":"On the effectiveness of defensive distillation","author":"Papernot","year":"2016","journal-title":"arXiv:1607.05113"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/3128572.3140447"},{"key":"ref22","article-title":"Adversarial machine learning at scale","author":"Kurakin","year":"2016","journal-title":"arXiv:1611.01236"},{"key":"ref23","article-title":"Towards deep learning models resistant to adversarial attacks","author":"Madry","year":"2017","journal-title":"arXiv:1706.06083"},{"key":"ref24","first-page":"2387","article-title":"Evasion and hardening of tree ensemble classifiers","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Kantchelian"},{"key":"ref25","first-page":"1122","article-title":"Robust decision trees against adversarial examples","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Chen"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2018.00020"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-66399-9_4"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1098\/rsta.2015.0202"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-21579-2_9"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1201\/9781315139470"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939785"},{"key":"ref32","first-page":"649","article-title":"Character-level convolutional networks for text classification","volume-title":"Proc. NIPS","author":"Zhang"},{"key":"ref33","first-page":"41","article-title":"An empirical study of the Naive Bayes classifier","volume-title":"Proc. IJCAI","volume":"3","author":"Rish"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45014-9_1"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1177\/154405910408300516"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.4310\/SII.2009.v2.n3.a8"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1007\/bf02985802"},{"key":"ref38","volume-title":"Rabbitmq","year":"2021"},{"key":"ref39","volume-title":"Samba","year":"2021"},{"key":"ref40","first-page":"1","volume-title":"An Introduction to Analysis and Optimization With AMD Codeanalyst Performance Analyzer","author":"Drongowski","year":"2008"},{"key":"ref41","volume-title":"Virustotal","year":"2021"},{"key":"ref42","volume-title":"Futuremark","year":"2021"},{"key":"ref43","volume-title":"Npackd","year":"2021"},{"key":"ref44","volume-title":"Ninite","year":"2021"},{"key":"ref45","volume-title":"Python Package Index","year":"2021"},{"key":"ref46","article-title":"Understanding random forests: From theory to practice","author":"Louppe","year":"2014"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/ICPPW.2012.58"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/ISPASS.2015.7095789"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1145\/2857055"},{"key":"ref50","volume-title":"Time Taken for Malware to Infect a System","year":"2021"},{"key":"ref51","volume-title":"Neural Networks: Tricks of the Trade","author":"Orr","year":"2003"},{"key":"ref52","first-page":"17","article-title":"Run-time energy consumption estimation based on workload in server systems","volume-title":"Proc. USENIX HotPower","author":"Lewis"}],"container-title":["IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/43\/9799721\/09504587.pdf?arnumber=9504587","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,12]],"date-time":"2024-01-12T00:12:34Z","timestamp":1705018354000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9504587\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,7]]},"references-count":52,"journal-issue":{"issue":"7"},"URL":"https:\/\/doi.org\/10.1109\/tcad.2021.3102007","relation":{},"ISSN":["0278-0070","1937-4151"],"issn-type":[{"value":"0278-0070","type":"print"},{"value":"1937-4151","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,7]]}}}