{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,15]],"date-time":"2025-12-15T19:48:55Z","timestamp":1765828135904,"version":"build-2065373602"},"reference-count":68,"publisher":"MDPI AG","issue":"4","license":[{"start":{"date-parts":[[2021,10,17]],"date-time":"2021-10-17T00:00:00Z","timestamp":1634428800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Cryptography"],"abstract":"<jats:p>According to recent security analysis reports, malicious software (a.k.a. malware) is rising at an alarming rate in numbers, complexity, and harmful purposes to compromise the security of modern computer systems. Recently, malware detection based on low-level hardware features (e.g., Hardware Performance Counters (HPCs) information) has emerged as an effective alternative solution to address the complexity and performance overheads of traditional software-based detection methods. Hardware-assisted Malware Detection (HMD) techniques depend on standard Machine Learning (ML) classifiers to detect signatures of malicious applications by monitoring built-in HPC registers during execution at run-time. Prior HMD methods though effective have limited their study on detecting malicious applications that are spawned as a separate thread during application execution, hence detecting stealthy malware patterns at run-time remains a critical challenge. Stealthy malware refers to harmful cyber attacks in which malicious code is hidden within benign applications and remains undetected by traditional malware detection approaches. In this paper, we first present a comprehensive review of recent advances in hardware-assisted malware detection studies that have used standard ML techniques to detect the malware signatures. Next, to address the challenge of stealthy malware detection at the processor\u2019s hardware level, we propose StealthMiner, a novel specialized time series machine learning-based approach to accurately detect stealthy malware trace at run-time using branch instructions, the most prominent HPC feature. StealthMiner is based on a lightweight time series Fully Convolutional Neural Network (FCN) model that automatically identifies potentially contaminated samples in HPC-based time series data and utilizes them to accurately recognize the trace of stealthy malware. Our analysis demonstrates that using state-of-the-art ML-based malware detection methods is not effective in detecting stealthy malware samples since the captured HPC data not only represents malware but also carries benign applications\u2019 microarchitectural data. The experimental results demonstrate that with the aid of our novel intelligent approach, stealthy malware can be detected at run-time with 94% detection performance on average with only one HPC feature, outperforming the detection performance of state-of-the-art HMD and general time series classification methods by up to 42% and 36%, respectively.<\/jats:p>","DOI":"10.3390\/cryptography5040028","type":"journal-article","created":{"date-parts":[[2021,10,18]],"date-time":"2021-10-18T13:59:52Z","timestamp":1634565592000},"page":"28","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":26,"title":["Towards Accurate Run-Time Hardware-Assisted Stealthy Malware Detection: A Lightweight, yet Effective Time Series CNN-Based Approach"],"prefix":"10.3390","volume":"5","author":[{"given":"Hossein","family":"Sayadi","sequence":"first","affiliation":[{"name":"Department of Computer Engineering and Computer Science, California State University, Long Beach, CA 90840, USA"}]},{"given":"Yifeng","family":"Gao","sequence":"additional","affiliation":[{"name":"Department of Computer Science, University of Texas Rio Grande Valley, McAllen, TX 78504, USA"}]},{"given":"Hosein","family":"Mohammadi Makrani","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, University of California, Davis, CA 95616, USA"}]},{"given":"Jessica","family":"Lin","sequence":"additional","affiliation":[{"name":"Department of Computer Science, George Mason University, Fairfax, VA 22030, USA"}]},{"given":"Paulo Cesar","family":"Costa","sequence":"additional","affiliation":[{"name":"Department of Systems Engineering and Operations Research, George Mason University, Fairfax, VA 22030, USA"}]},{"given":"Setareh","family":"Rafatirad","sequence":"additional","affiliation":[{"name":"Department of Computer Science, University of California, Davis, CA 95616, USA"}]},{"given":"Houman","family":"Homayoun","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, University of California, Davis, CA 95616, USA"}]}],"member":"1968","published-online":{"date-parts":[[2021,10,17]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","unstructured":"Sayadi, H., Gao, Y., Mohammadi Makrani, H., Mohsenin, T., Sasan, A., Rafatirad, S., Lin, J., and Homayoun, H. (2020, January 7\u20139). Stealthminer: Specialized time series machine learning for run-time stealthy malware detection based on microarchitectural features. Proceedings of the 2020 on Great Lakes Symposium on VLSI (GLSVLSI\u201920), Virtual Event, China.","DOI":"10.1145\/3386263.3407585"},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"Sayadi, H., Wang, H., Miari, T., Makrani, H.M., Aliasgari, M., Rafatirad, S., and Homayoun, H. (2020, January 9\u201312). Recent advancements in microarchitectural security: Review of machine learning countermeasures. Proceedings of the 2020 IEEE 63rd International Midwest Symposium on Circuits and Systems (MWSCAS), Springfield, MA, USA.","DOI":"10.1109\/MWSCAS48704.2020.9184539"},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"586","DOI":"10.1109\/TETC.2016.2606384","article-title":"A comprehensive study of security of internet-of-things","volume":"5","author":"Mosenia","year":"2016","journal-title":"IEEE Trans. Emerg. Top. Comput."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"138508","DOI":"10.1109\/ACCESS.2020.3011919","article-title":"Cognitive and scalable technique for securing IoT networks against malware epidemics","volume":"8","author":"Dinakarrao","year":"2020","journal-title":"IEEE Access"},{"key":"ref_5","doi-asserted-by":"crossref","unstructured":"Bettany, A., and Halsey, M. (2017). What Is Malware?. Windows Virus and Malware Troubleshooting, Apress.","DOI":"10.1007\/978-1-4842-2607-0"},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"283","DOI":"10.3844\/ajassp.2012.283.288","article-title":"Malware detection based on hybrid signature behaviour application programming interface call graph","volume":"9","author":"Elhadi","year":"2012","journal-title":"Am. J. Appl. Sci."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"251","DOI":"10.1007\/s11416-008-0086-0","article-title":"Behavioral detection of malware: From a survey towards an established taxonomy","volume":"4","author":"Jacob","year":"2008","journal-title":"J. Comput. Virol."},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"McAfee Labs (2021, October 13). Mcafee Labs Threats Report. Available online: https:\/\/www.mcafee.com\/enterprise\/en-us\/assets\/reports\/rp-quarterly-threats-aug-2019.pdf.","DOI":"10.1016\/S1361-3723(19)30004-1"},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Christodorescu, M., Jha, S., and Kruegel, C. (2007, January 3\u20137). Mining Specifications of Malicious Behavior. Proceedings of the the 6th Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on The Foundations of Software Engineering (ESEC-FSE\u201907), New York, NY, USA.","DOI":"10.1145\/1287624.1287628"},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Moser, A., Kruegel, C., and Kirda, E. (2007, January 10\u201314). Limits of Static Analysis for Malware Detection. Proceedings of the Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007), Miami Beach, FL, USA.","DOI":"10.1109\/ACSAC.2007.21"},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Preda, M.D., Christodorescu, M., Jha, S., and Debray, S. (2007, January 20\u201322). A Semantics-based Approach to Malware Detection. Proceedings of the 34th Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (POPL\u201907), New York, NY, USA.","DOI":"10.1145\/1190216.1190270"},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Burguera, I., Zurutuza, U., and Nadjm-Tehrani, S. (2011, January 17). Crowdroid: Behavior-based Malware Detection System for Android. Proceedings of the 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM\u201911), New York, NY, USA.","DOI":"10.1145\/2046614.2046619"},{"key":"ref_13","unstructured":"Gu, G., Porras, P., Yegneswaran, V., Fong, M., and Lee, W. (2007, January 6\u201310). BotHunter: Detecting Malware Infection through IDS-driven Dialog Correlation. Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium, Berkeley, CA, USA."},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Sayadi, H., Makrani, H., Randive, O., Sai Manoj, P.D., Rafatirad, S., and Homayoun, H. (2018, January 1\u20133). Customized Machine Learning-Based Hardware-Assisted Malware Detection in Embedded Devices. Proceedings of the 17th IEEE International Conference On Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-18), New York, NY, USA.","DOI":"10.1109\/TrustCom\/BigDataSE.2018.00251"},{"key":"ref_15","doi-asserted-by":"crossref","unstructured":"Pudukotai Dinakarrao, S.M., Sayadi, H., Makrani, H.M., Nowzari, C., Rafatirad, S., and Homayoun, H. (2019, January 25\u201329). Lightweight Node-level Malware Detection and Network-level Malware Confinement in IoT Networks. Proceedings of the 2019 Design, Automation Test in Europe Conference Exhibition (DATE), Florence, Italy.","DOI":"10.23919\/DATE.2019.8715057"},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Demme, J., Maycock, M., Schmitz, J., Tang, A., Waksman, A., Sethumadhavan, S., and Stolfo, S. (2013, January 23\u201327). On the Feasibility of Online Malware Detection with Performance Counters. Proceedings of the 40th Annual International Symposium on Computer Architecture (ISCA\u201913), Tel-Aviv, Israel.","DOI":"10.1145\/2485922.2485970"},{"key":"ref_17","doi-asserted-by":"crossref","unstructured":"Tang, A., Sethumadhavan, S., and Stolfo, S.J. (2014). Unsupervised Anomaly-Based Malware Detection Using Hardware Features. Research in Attacks, Intrusions and Defenses, Springer.","DOI":"10.1007\/978-3-319-11379-1_6"},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Sayadi, H., Patel, N., Sasan, A., Rafatirad, S., and Homayoun, H. (2018, January 24\u201328). Ensemble Learning for Effective Run-time Hardware-based Malware Detection: A Comprehensive Analysis and Classification. Proceedings of the 55th ACM\/ESDA\/IEEE Design Automation Conference, San Francisco, CA, USA.","DOI":"10.1145\/3195970.3196047"},{"key":"ref_19","unstructured":"Garcia-Serrano, A. (2015). Anomaly Detection for malware identification using Hardware Performance Counters. arXiv."},{"key":"ref_20","unstructured":"Guthaus, M.R., Pingenberg, J.S., Austin, T.M., Mudge, T., and Brown-MiBench, R.B. (2001, January 2). MiBench: A free, commercially representative embedded benchmark suite. Proceedings of the Fourth Annual IEEE International Workshop on Workload Characterization, Austin, TX, USA."},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Wang, X., Konstantinou, C., Maniatakos, M., and Karri, R. (2015, January 2\u20136). Confirm ConFirm: Detecting firmware modifications in embedded systems using Hardware Performance Counters. Proceedings of the 2015 IEEE\/ACM International Conference on Computer-Aided Design (ICCAD), Austin, TX, USA.","DOI":"10.1109\/ICCAD.2015.7372617"},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Sayadi, H., Makrani, H.M., Pudukotai Dinakarrao, S.M., Mohsenin, T., Sasan, A., Rafatirad, S., and Homayoun, H. (2019, January 25\u201329). 2SMaRT: A Two-Stage Machine Learning-Based Approach for Run-Time Specialized Hardware-Assisted Malware Detection. Proceedings of the 2019 Design, Automation Test in Europe Conference Exhibition (DATE\u201919), Grenoble, France.","DOI":"10.23919\/DATE.2019.8715080"},{"key":"ref_23","doi-asserted-by":"crossref","unstructured":"Ozsoy, M., Donovick, C., Gorelik, I., Abu-Ghazaleh, N., and Ponomarev, D. (2015, January 7\u201311). Malware-aware processors: A framework for efficient online malware detection. Proceedings of the 2015 IEEE 21st International Symposium on High Performance Computer Architecture (HPCA), Burlingame, CA, USA.","DOI":"10.1109\/HPCA.2015.7056070"},{"key":"ref_24","doi-asserted-by":"crossref","unstructured":"Patel, N., Sasan, A., and Homayoun, H. (2017, January 18\u201322). Analyzing Hardware Based Malware Detectors. Proceedings of the 54th Annual Design Automation Conference (DAC \u201917), Austin, TX, USA.","DOI":"10.1145\/3061639.3062202"},{"key":"ref_25","doi-asserted-by":"crossref","unstructured":"Christodorescu, M., Jha, S., Maughan, D., Song, D., and Wang, C. (2007). Towards Stealthy Malware Detection. Malware Detection, Springer US.","DOI":"10.1007\/978-0-387-44599-1"},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"1145","DOI":"10.1109\/COMST.2016.2636078","article-title":"A Survey of Stealth Malware Attacks, Mitigation Measures, and Steps Toward Autonomous Open World Solutions","volume":"19","author":"Rudd","year":"2017","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_27","doi-asserted-by":"crossref","unstructured":"Zhang, H., Yao, D., and Ramakrishnan, N. (2014, January 4\u20136). Detection of stealthy malware activities with traffic causality and scalable triggering relation discovery. Proceedings of the ACM Asia Conference on Computer and Communications Security (ASIA CCS\u201914), Kyoto, Japan.","DOI":"10.1145\/2590296.2590309"},{"key":"ref_28","doi-asserted-by":"crossref","unstructured":"Li, W.J., Stolfo, S., Stavrou, A., Androulaki, E., and Keromytis, A.D. (2007). A Study of Malcode-Bearing Documents. Detection of Intrusions and Malware, and Vulnerability Assessment, Springer.","DOI":"10.1007\/978-3-540-73614-1_14"},{"key":"ref_29","unstructured":"Jiang, X., Wang, X., and Xu, D. (November, January 31). Stealthy Malware Detection Through Vmm-based \u201cOut-of-the-box\u201d Semantic View Reconstruction. Proceedings of the Conference on Computer and Communications Security (CCS\u201907)."},{"key":"ref_30","doi-asserted-by":"crossref","unstructured":"Singh, B., Evtyushkin, D., Elwell, J., Riley, R., and Cervesato, I. (2017, January 2\u20134). On the Detection of Kernel-Level Rootkits Using Hardware Performance Counters. Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security (ASIA CCS\u201917), New York, NY, USA.","DOI":"10.1145\/3052973.3052999"},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1007\/978-3-319-26362-5_1","article-title":"Ensemble Learning for Low-Level Hardware-Supported Malware Detection","volume":"Volume 9404","author":"Khasawneh","year":"2015","journal-title":"Research in Attacks, Intrusions, and Defenses"},{"key":"ref_32","doi-asserted-by":"crossref","unstructured":"Bahador, M.B., Abadi, M., and Tajoddin, A. (2014, January 29\u201330). HPCMalHunter: Behavioral malware detection using hardware performance counters and singular value decomposition. Proceedings of the 2014 4th International Conference on Computer and Knowledge Engineering (ICCKE), Mashhad, Iran.","DOI":"10.1109\/ICCKE.2014.6993402"},{"key":"ref_33","doi-asserted-by":"crossref","unstructured":"Doyle, N.C., Matthews, E., Holl, G., Fedorova, A., and Shannon, L. (2017, January 27\u201331). Performance impacts and limitations of hardware memory access trace collection. Proceedings of the Design, Automation Test in Europe Conference Exhibition (DATE), Lausanne, Switzerland.","DOI":"10.23919\/DATE.2017.7927041"},{"key":"ref_34","doi-asserted-by":"crossref","unstructured":"Malone, C., Zahran, M., and Karri, R. (2011, January 17). Are Hardware Performance Counters a Cost Effective Way for Integrity Checking of Programs. Proceedings of the Sixth ACM Workshop on Scalable Trusted Computing, Chicago, IL, USA.","DOI":"10.1145\/2046582.2046596"},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"64","DOI":"10.1109\/MM.2002.1028477","article-title":"The basics of performance-monitoring hardware","volume":"22","author":"Sprunt","year":"2002","journal-title":"IEEE Micro"},{"key":"ref_36","unstructured":"(2020, January 10). Intel Performance Monitoring Unit. Available online: https:\/\/software.intel.com\/en-us\/articles\/intel-performance-counter-monitor."},{"key":"ref_37","doi-asserted-by":"crossref","unstructured":"Sayadi, H., and Homayoun, H. (2017, January 23\u201325). Scheduling multithreaded applications onto heterogeneous composite cores architecture. Proceedings of the 2017 Eighth International Green and Sustainable Computing Conference (IGSC), Orlando, FL, USA.","DOI":"10.1109\/IGCC.2017.8323570"},{"key":"ref_38","doi-asserted-by":"crossref","unstructured":"Malik, M., Tullsen, D.M., and Homayoun, H. (2017, January 1\u20133). Co-locating and concurrent fine-tuning MapReduce applications on microservers for energy efficiency. Proceedings of the 2017 IEEE International Symposium on Workload Characterization (IISWC), Seattle, WA, USA.","DOI":"10.1109\/IISWC.2017.8167753"},{"key":"ref_39","doi-asserted-by":"crossref","unstructured":"Makrani, H.M., Sayadi, H., Motwani, D., Wang, H., Rafatirad, S., and Homayoun, H. (2018, January 11\u201313). Energy-aware and machine learning-based resource provisioning of in-memory analytics on cloud. Proceedings of the ACM Symposium on Cloud Computing, Carlsbad, CA, USA.","DOI":"10.1145\/3267809.3275459"},{"key":"ref_40","doi-asserted-by":"crossref","unstructured":"Bircher, W.L., and John, L.K. (2007, January 25\u201327). Complete System Power Estimation: A Trickle-Down Approach Based on Performance Events. Proceedings of the 2007 IEEE International Symposium on Performance Analysis of Systems Software, San Jose, CA, USA.","DOI":"10.1109\/ISPASS.2007.363746"},{"key":"ref_41","doi-asserted-by":"crossref","unstructured":"Elnaggar, R., Chakrabarty, K., and Tahoori, M.B. (November, January 31). Run-time hardware trojan detection using performance counters. Proceedings of the 2017 IEEE International Test Conference (ITC), Fort Worth, TX, USA.","DOI":"10.1109\/TEST.2017.8242063"},{"key":"ref_42","doi-asserted-by":"crossref","first-page":"3332","DOI":"10.1109\/TC.2016.2540634","article-title":"Hardware-Based Malware Detection Using Low-Level Architectural Features","volume":"65","author":"Ozsoy","year":"2016","journal-title":"IEEE Trans. Comput."},{"key":"ref_43","doi-asserted-by":"crossref","unstructured":"Zhou, B., Gupta, A., Jahanshahi, R., Egele, M., and Joshi, A. (2018, January 4). Hardware Performance Counters Can Detect Malware: Myth or Fact?. Proceedings of the 2018 on Asia Conference on Computer and Communications Security (ASIACCS\u201918), Incheon, Korea.","DOI":"10.1145\/3196494.3196515"},{"key":"ref_44","unstructured":"Goodfellow, I.J., Shlens, J., and Szegedy, C. (2015). Explaining and Harnessing Adversarial Examples. arXiv."},{"key":"ref_45","doi-asserted-by":"crossref","unstructured":"Shafiq, M.Z., Khayam, S.A., and Farooq, M. (2008). Embedded Malware Detection Using Markov n-Grams. International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, Springer.","DOI":"10.1007\/978-3-540-70542-0_5"},{"key":"ref_46","unstructured":"Ye, L., and Keogh, E. (July, January 28). Time series shapelets: A new primitive for data mining. Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD\u201909), Paris, France."},{"key":"ref_47","doi-asserted-by":"crossref","unstructured":"Lin, J., and Li, Y. (2009). Finding structural similarity in time series data using bag-of-patterns representation. Scientific and Statistical Database Management, Springer.","DOI":"10.1007\/978-3-642-02279-1_33"},{"key":"ref_48","doi-asserted-by":"crossref","unstructured":"Rakthanmanon, T., and Keogh, E. (2013, January 2\u20134). Fast shapelets: A scalable algorithm for discovering time series shapelets. Proceedings of the 2013 SIAM International Conference on Data Mining (SDM\u201913), Austin, TX, USA.","DOI":"10.1137\/1.9781611972832.74"},{"key":"ref_49","unstructured":"Wang, X., Lin, J., Senin, P., Oates, T., Gandhi, S., Boedihardjo, A.P., Chen, C., and Frankenstein, S. (2016, January 15\u201316). RPM: Representative Pattern Mining for Efficient Time Series Classification. Proceedings of the 19th International Conference on Extending Database Technology (EDBT\u201916), Bordeaux, France."},{"key":"ref_50","doi-asserted-by":"crossref","unstructured":"Grabocka, J., Schilling, N., Wistuba, M., and Schmidt-Thieme, L. (2014, January 24\u201327). Learning time-series shapelets. Proceedings of the 20th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD\u201914), New York, NY, USA.","DOI":"10.1145\/2623330.2623613"},{"key":"ref_51","doi-asserted-by":"crossref","unstructured":"Li, X., and Lin, J. (2018, January 3\u20135). Evolving separating references for time series classification. Proceedings of the 2018 SIAM International Conference on Data Mining (SDM\u201918), San Diego, CA, USA.","DOI":"10.1137\/1.9781611975321.28"},{"key":"ref_52","doi-asserted-by":"crossref","first-page":"851","DOI":"10.1007\/s10618-013-0322-1","article-title":"Classification of time series by shapelet transformation","volume":"28","author":"Hills","year":"2014","journal-title":"Data Min. Knowl. Discov."},{"key":"ref_53","doi-asserted-by":"crossref","unstructured":"Senin, P., and Malinchik, S. (2013, January 7\u201310). Sax-vsm: Interpretable time series classification using sax and vector space model. Proceedings of the 2013 IEEE 13th International Conference on Data Mining (ICDM), Dallas, TX, USA.","DOI":"10.1109\/ICDM.2013.52"},{"key":"ref_54","doi-asserted-by":"crossref","first-page":"1505","DOI":"10.1007\/s10618-014-0377-7","article-title":"The BOSS is concerned with time series classification in the presence of noise","volume":"29","year":"2015","journal-title":"Data Min. Knowl. Discov."},{"key":"ref_55","doi-asserted-by":"crossref","first-page":"1662","DOI":"10.1109\/ACCESS.2017.2779939","article-title":"LSTM fully convolutional networks for time series classification","volume":"6","author":"Karim","year":"2018","journal-title":"IEEE Access"},{"key":"ref_56","doi-asserted-by":"crossref","unstructured":"Wang, Z., Yan, W., and Oates, T. (2017, January 14\u201319). Time series classification from scratch with deep neural networks: A strong baseline. Proceedings of the 2017 International Joint Conference on Neural Networks (IJCNN), Anchorage, AK, USA.","DOI":"10.1109\/IJCNN.2017.7966039"},{"key":"ref_57","first-page":"6845","article-title":"Tapnet: Multivariate time series classification with attentional prototypical network","volume":"34","author":"Zhang","year":"2020","journal-title":"Proc. AAAI Conf. Artif. Intell."},{"key":"ref_58","unstructured":"Yang, J., Nguyen, M.N., San, P.P., Li, X.L., and Krishnaswamy, S. (2015, January 25\u201331). Deep convolutional neural networks on multichannel time series for human activity recognition. Proceedings of the Twenty-Fourth International Joint Conference on Artificial Intelligence (IJCAI\u201915), Buenos Aires, Argentina."},{"key":"ref_59","doi-asserted-by":"crossref","first-page":"1273","DOI":"10.1007\/s10618-015-0441-y","article-title":"Scalable time series classification","volume":"30","year":"2016","journal-title":"Data Min. Knowl. Discov."},{"key":"ref_60","doi-asserted-by":"crossref","unstructured":"Li, X., and Lin, J. (2017, January 18\u201321). Linear Time Complexity Time Series Classification with Bag-of-Pattern-Features. Proceedings of the 2017 IEEE International Conference on Data Mining (ICDM), New Orleans, LA, USA.","DOI":"10.1109\/ICDM.2017.37"},{"key":"ref_61","first-page":"2579","article-title":"Visualizing data using t-SNE","volume":"9","author":"Hinton","year":"2008","journal-title":"J. Mach. Learn. Res."},{"key":"ref_62","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/1186736.1186737","article-title":"SPEC CPU2006 Benchmark Descriptions","volume":"34","author":"Henning","year":"2006","journal-title":"SIGARCH Comput. Archit. News"},{"key":"ref_63","unstructured":"Helsely, M., and IBM Developer Works Technical Library (2021, October 13). Lxc: Linux Container Tools. Available online: https:\/\/developer.ibm.com\/tutorials\/l-lxc-containers\/."},{"key":"ref_64","doi-asserted-by":"crossref","unstructured":"Das, S., Werner, J., Antonakakis, M., Polychronakis, M., and Monrose, F. (2019, January 19\u201323). SoK: The challenges, pitfalls, and perils of using hardware performance counters for security. Proceedings of the 2019 IEEE Symposium on Security and Privacy (SP), San Francisco, CA, USA.","DOI":"10.1109\/SP.2019.00021"},{"key":"ref_65","unstructured":"Kingma, D.P., and Ba, J. (2014). Adam: A method for stochastic optimization. arXiv."},{"key":"ref_66","doi-asserted-by":"crossref","first-page":"2627","DOI":"10.1016\/S1352-2310(97)00447-0","article-title":"Artificial neural networks (the multilayer perceptron)\u2014A review of applications in the atmospheric sciences","volume":"32","author":"Gardner","year":"1998","journal-title":"Atmos. Environ."},{"key":"ref_67","doi-asserted-by":"crossref","unstructured":"He, K., Zhang, X., Ren, S., and Sun, J. (2016, January 27\u201330). Deep residual learning for image recognition. Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, Las Vegas, NV, USA.","DOI":"10.1109\/CVPR.2016.90"},{"key":"ref_68","doi-asserted-by":"crossref","unstructured":"Zheng, Y., Liu, Q., Chen, E., Ge, Y., and Zhao, J.L. (2014, January 16\u201318). Time series classification using multi-channels deep convolutional neural networks. Proceedings of the International Conference on Web-Age Information Management, Macau, China.","DOI":"10.1007\/978-3-319-08010-9_33"}],"container-title":["Cryptography"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2410-387X\/5\/4\/28\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T07:16:30Z","timestamp":1760166990000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2410-387X\/5\/4\/28"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,10,17]]},"references-count":68,"journal-issue":{"issue":"4","published-online":{"date-parts":[[2021,12]]}},"alternative-id":["cryptography5040028"],"URL":"https:\/\/doi.org\/10.3390\/cryptography5040028","relation":{},"ISSN":["2410-387X"],"issn-type":[{"type":"electronic","value":"2410-387X"}],"subject":[],"published":{"date-parts":[[2021,10,17]]}}}