{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,19]],"date-time":"2026-03-19T02:54:38Z","timestamp":1773888878023,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":24,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,6,24]],"date-time":"2018-06-24T00:00:00Z","timestamp":1529798400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,6,24]]},"DOI":"10.1145\/3195970.3196047","type":"proceedings-article","created":{"date-parts":[[2018,6,19]],"date-time":"2018-06-19T13:54:59Z","timestamp":1529416499000},"page":"1-6","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":46,"title":["Ensemble learning for effective run-time hardware-based malware detection"],"prefix":"10.1145","author":[{"given":"Hossein","family":"Sayadi","sequence":"first","affiliation":[{"name":"George Mason University"}]},{"given":"Nisarg","family":"Patel","sequence":"additional","affiliation":[{"name":"George Mason University"}]},{"given":"Sai Manoj P","family":"D","sequence":"additional","affiliation":[{"name":"George Mason University"}]},{"given":"Avesta","family":"Sasan","sequence":"additional","affiliation":[{"name":"George Mason University"}]},{"given":"Setareh","family":"Rafatirad","sequence":"additional","affiliation":[{"name":"George Mason University"}]},{"given":"Houman","family":"Homayoun","sequence":"additional","affiliation":[{"name":"George Mason University"}]}],"member":"320","published-online":{"date-parts":[[2018,6,24]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"http:\/\/www.virustotal.com\/intelligence\/","year":"2017","unstructured":"Virustotal intelligence service. http:\/\/www.virustotal.com\/intelligence\/ . Accessed : December 2017 . Virustotal intelligence service. http:\/\/www.virustotal.com\/intelligence\/. Accessed: December 2017."},{"key":"e_1_3_2_1_2_1","volume-title":"IEEE ICCKE","year":"2014","unstructured":"Bahador : Behavioral malware detection using hardware performance counters and singular value decomposition \", In IEEE ICCKE , 2014 . Bahador et al., \"Hpcmalhunter: Behavioral malware detection using hardware performance counters and singular value decomposition\", In IEEE ICCKE, 2014."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508148.2485970"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3061639.3062202"},{"key":"e_1_3_2_1_5_1","volume-title":"Garcia-Serrano et al., \"Anomaly detection for malware identification using hardware performance counters\", preprint arXiv:1508.07482","author":"A.","year":"2015","unstructured":"A. Garcia-Serrano et al., \"Anomaly detection for malware identification using hardware performance counters\", preprint arXiv:1508.07482 , 2015 . A. Garcia-Serrano et al., \"Anomaly detection for malware identification using hardware performance counters\", preprint arXiv:1508.07482, 2015."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.5555\/1128020.1128563"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1656274.1656278"},{"key":"e_1_3_2_1_8_1","volume-title":"Linux container tools. IBM developer Works Technical Library","author":"Helsley M.","year":"2009","unstructured":"M. Helsley , \"Lxc : Linux container tools. IBM developer Works Technical Library , 2009 . M. Helsley, \"Lxc: Linux container tools. IBM developer Works Technical Library, 2009."},{"key":"e_1_3_2_1_9_1","first-page":"18","article-title":"Intel 64 and ia-32 architectures software developer's manual, volume 3b: System programming guide","volume":"2","year":"2016","unstructured":"Intel. \" Intel 64 and ia-32 architectures software developer's manual, volume 3b: System programming guide \", Part , 2 : 18 - 65 , 2016 . Intel. \"Intel 64 and ia-32 architectures software developer's manual, volume 3b: System programming guide\", Part, 2:18-65, 2016.","journal-title":"Part"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-008-0086-0"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-26362-5_1"},{"key":"e_1_3_2_1_12_1","volume-title":"Infographic: Mcafee labs threats report","year":"2017","unstructured":"McAfee Labs. Infographic: Mcafee labs threats report . December 2017 . McAfee Labs. Infographic: Mcafee labs threats report. December 2017."},{"key":"e_1_3_2_1_13_1","volume-title":"HPCA'15","author":"Ozsoy M.","year":"2015","unstructured":"M. Ozsoy : A framework for efficient online malware detection \", In HPCA'15 , 2015 . M. Ozsoy et al., \"Malware-aware processors: A framework for efficient online malware detection\", In HPCA'15, 2015."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCD.2017.28"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-11379-1_6"},{"key":"e_1_3_2_1_16_1","volume-title":"Confirm: Detecting firmware modifications in embedded systems using hardware performance counters,\" In ICCAD'15","year":"2015","unstructured":"Wang , \" Confirm: Detecting firmware modifications in embedded systems using hardware performance counters,\" In ICCAD'15 , 2015 . Wang et al., \"Confirm: Detecting firmware modifications in embedded systems using hardware performance counters,\" In ICCAD'15, 2015."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/MM.2002.1028477"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1006\/jcss.1997.1504"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1018054314350"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/IGCC.2017.8323570"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046582.2046596"},{"key":"e_1_3_2_1_22_1","volume-title":"South Korea","author":"Sayadi H.","year":"2018","unstructured":"H. Sayadi conversion efficiency-aware mapping of multithreaded applications on heterogeneous architectures: A comprehensive parameter tuning\" In ASP-DAC'18 , South Korea , January 2018 . H. Sayadi et al., \"Power conversion efficiency-aware mapping of multithreaded applications on heterogeneous architectures: A comprehensive parameter tuning\" In ASP-DAC'18, South Korea, January 2018."},{"key":"e_1_3_2_1_23_1","volume-title":"May","author":"Doyle N. C.","year":"2017","unstructured":"N. C. Doyle , \" Performance impacts and limitations of hardware memory access trace collection,\" In DATE'17 , May 2017 . N. C. Doyle et al., \"Performance impacts and limitations of hardware memory access trace collection,\" In DATE'17, May 2017."},{"key":"e_1_3_2_1_24_1","volume-title":"CF'18","author":"Sayadi H.","year":"2018","unstructured":"H. Sayadi , In CF'18 , Ischia, Italy , May 2018 . H. Sayadi et al., \"Comprehensive Assessment of Run-Time Hardware-Supported Malware Detection Using General and Ensemble Learning\", In CF'18, Ischia, Italy, May 2018."}],"event":{"name":"DAC '18: The 55th Annual Design Automation Conference 2018","location":"San Francisco California","acronym":"DAC '18","sponsor":["EDAC Electronic Design Automation Consortium","SIGDA ACM Special Interest Group on Design Automation","IEEE Council on Electronic Design Automation (CEDA)","SIGBED ACM Special Interest Group on Embedded Systems"]},"container-title":["Proceedings of the 55th Annual Design Automation Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3195970.3196047","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3195970.3196047","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T01:39:12Z","timestamp":1750210752000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3195970.3196047"}},"subtitle":["a comprehensive analysis and classification"],"short-title":[],"issued":{"date-parts":[[2018,6,24]]},"references-count":24,"alternative-id":["10.1145\/3195970.3196047","10.1145\/3195970"],"URL":"https:\/\/doi.org\/10.1145\/3195970.3196047","relation":{},"subject":[],"published":{"date-parts":[[2018,6,24]]},"assertion":[{"value":"2018-06-24","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}