Using Side Channel Information and Artificial Intelligence for Malware Detection
dc.contributor.author | Maxwell, Paul | |
dc.contributor.author | Niblick, David | |
dc.contributor.author | Ruiz, Daniel C. | |
dc.date.accessioned | 2023-05-04T17:20:20Z | |
dc.date.available | 2023-05-04T17:20:20Z | |
dc.date.issued | 2021-06-28 | |
dc.description.abstract | Cybersecurity continues to be a difficult issue for society especially as the number of networked systems grows. Techniques to protect these systems range from rules-based to artificial intelligence-based intrusion detection systems and anti-virus tools. These systems rely upon the information contained in network packets and downloaded executables to function. Side channel information leaked from hardware has been shown to reveal secret information in systems such as encryption keys. Computers provide many side channels such as temperature, access rates, operational frequencies, and voltages that can provide insight into what is running on a system. This work demonstrates that this side channel information can be used to detect malware running on a computing platform without access to the code involved. | |
dc.identifier.citation | P. Maxwell, D. Niblick and D. C. Ruiz, "Using Side Channel Information and Artificial Intelligence for Malware Detection," 2021 IEEE International Conference on Artificial Intelligence and Computer Applications (ICAICA), Dalian, China, 2021, pp. 408-413, doi: 10.1109/ICAICA52286.2021.9498094 | |
dc.identifier.doi | https://doi.org/10.1109/icaica52286.2021.9498094 | |
dc.identifier.uri | https://hdl.handle.net/20.500.14216/138 | |
dc.language.iso | en_US | |
dc.relation.ispartof | 2021 IEEE International Conference on Artificial Intelligence and Computer Applications (ICAICA) | |
dc.title | Using Side Channel Information and Artificial Intelligence for Malware Detection | |
dc.type | proceedings-article |