Studies in the past have investigated the feasibility of using HPCs (Hardware Performance Counters) as a metric to differentiate between benignware and malware. A major study titled “Hardware Performance Counters Can Detect Malware: Myth or Fact?” in 2018 concluded by using statistical models like Random Forest and Decision Tree that HPCs are not able to serve as a suitable metric. In the time since that study was published, newer deep learning models and techniques have been created. This paper first attempts to replicate the major study mentioned previously, then further investigate the feasibility of using HPCs as a metric with other models and techniques not used previously. LSTM (Long-Term Short Memory), Dense, and Ensemble models were...
Existing malware detectors on safety-critical devices have difficulties in runtime detection due to ...
Malware brings constant threats to the services and facilities used by modern society. In order to p...
The daily use of mobile phones, and particularly smartphones, has become an integral part of modern ...
Recent work has investigated the use of hardware perfor- mance counters (HPCs) for the detection of ...
According to recent security analysis reports, malicious software (a.k.a. malware) is rising at an a...
It is often claimed that the primary advantage of deep learning is that such models can continue to ...
Malware is one of the most frequent cyberattacks, with its prevalence growing daily across the netwo...
Despite the use of modern anti-virus (AV) software, malware is a prevailing threat to today's comput...
Cloud infrastructure is vulnerable to malware due to its exposure to external adversaries, making it...
Malware detection still remains as one of the greatest challenges in computer security due to increa...
Malicious software (ransom ware) cyber attacks in frequency and severity, posing an increasingly ser...
Malware has become a more widespread problem alongside the rapid growth of technology. Malware is an...
Malware has become a more widespread problem alongside the rapid growth of technology. Malware is an...
With the rise of the popularity of machine learning (ML), it has been shown that ML-based classifier...
With the rise of the popularity of machine learning (ML), it has been shown that ML-based classifier...
Existing malware detectors on safety-critical devices have difficulties in runtime detection due to ...
Malware brings constant threats to the services and facilities used by modern society. In order to p...
The daily use of mobile phones, and particularly smartphones, has become an integral part of modern ...
Recent work has investigated the use of hardware perfor- mance counters (HPCs) for the detection of ...
According to recent security analysis reports, malicious software (a.k.a. malware) is rising at an a...
It is often claimed that the primary advantage of deep learning is that such models can continue to ...
Malware is one of the most frequent cyberattacks, with its prevalence growing daily across the netwo...
Despite the use of modern anti-virus (AV) software, malware is a prevailing threat to today's comput...
Cloud infrastructure is vulnerable to malware due to its exposure to external adversaries, making it...
Malware detection still remains as one of the greatest challenges in computer security due to increa...
Malicious software (ransom ware) cyber attacks in frequency and severity, posing an increasingly ser...
Malware has become a more widespread problem alongside the rapid growth of technology. Malware is an...
Malware has become a more widespread problem alongside the rapid growth of technology. Malware is an...
With the rise of the popularity of machine learning (ML), it has been shown that ML-based classifier...
With the rise of the popularity of machine learning (ML), it has been shown that ML-based classifier...
Existing malware detectors on safety-critical devices have difficulties in runtime detection due to ...
Malware brings constant threats to the services and facilities used by modern society. In order to p...
The daily use of mobile phones, and particularly smartphones, has become an integral part of modern ...