Defending Hardware-based Malware Detectors against Adversarial Attacks.
Abraham Peedikayil KuruvilaShamik KunduKanad BasuPublished in: CoRR (2020)
Keyphrases
- detect malicious
- ddos attacks
- malicious code
- detecting malicious
- low cost
- object detection
- hardware and software
- attack scenarios
- hardware implementation
- real time
- countermeasures
- reverse engineering
- multi agent
- malicious attacks
- massively parallel
- vlsi implementation
- computer systems
- terrorist attacks
- computing power
- hardware architecture
- static analysis
- computer security
- java card
- security risks
- dynamic analysis
- security threats
- denial of service attacks
- feature detectors
- security protocols
- control flow
- malicious users
- weak classifiers
- computing systems