Author:
Wang Xiangyi,Zhang Jian,Meng Zheng
Publisher
Springer Nature Singapore
Reference43 articles.
1. Alasmary, H., Khormali, A., Anwar, A., Park, J., Choi, J., et al.: A.A.: Analyzing and detecting emerging internet of things malware: A graph-based approach. IEEE Internet Things J. 6(5), 8977–8988 (2019). https://doi.org/10.1109/JIOT.2019.2925929
2. Alrawi, O., Lever, C., Valakuzhy, K., Court, R., Snow, K.Z., Monrose, F., Antonakakis, M.: The circle of life: a large-scale study of the iot malware lifecycle. In: 30th USENIX Security Symposium, pp. 3505–3522. Vancouver, B.C., Canada, August 2021
3. Basu, K., Krishnamurthy, P., Khorrami, F., Karri, R.: A theoretical study of hardware performance counters-based malware detection. IEEE Trans. Inf. Forensics Secur. 15, 512–525 (2020). https://doi.org/10.1109/TIFS.2019.2924549
4. Das, S., Werner, J., Antonakakis, M., Polychronakis, M., Monrose, F.: SoK: the challenges, pitfalls, and perils of using hardware performance counters for security. In: IEEE Symposium on Security and Privacy (SP), pp. 20–38. San Francisco, CA, USA (2019). https://doi.org/10.1109/SP.2019.00021
5. Dinakarrao, S.M.P., Sayadi, H., Makrani, H.M., Nowzari, C., Rafatirad, S., Homayoun, H.: Lightweight node-level malware detection and network-level malware confinement in iot networks. In: 2019 Design, Automation & Test in Europe Conference & Exhibition (DATE), pp. 776–781 (2019). https://doi.org/10.23919/DATE.2019.8715057,