[HTML][HTML] Towards accurate run-time hardware-assisted stealthy malware detection: a lightweight, yet effective time series CNN-based approach

H Sayadi, Y Gao, H Mohammadi Makrani, J Lin… - Cryptography, 2021 - mdpi.com
According to recent security analysis reports, malicious software (aka malware) is rising at
an alarming rate in numbers, complexity, and harmful purposes to compromise the security …

A comprehensive survey on hardware-assisted malware analysis and primitive techniques

EP Kumar, S Priyanka - Computer Networks, 2023 - Elsevier
Malware poses an extremely dangerous threat to the digital world, significantly impacting
various domains such as smart cities, intelligent transportation, wireless sensor networks …

When machine learning meets hardware cybersecurity: Delving into accurate zero-day malware detection

Z He, T Miari, HM Makrani, M Aliasgari… - … on Quality Electronic …, 2021 - ieeexplore.ieee.org
Cybersecurity for the past decades has been in the front line of global attention as a critical
threat to the information technology infrastructures. According to recent security reports …

Image-based zero-day malware detection in iomt devices: A hybrid ai-enabled method

Z He, H Sayadi - 2023 24th International Symposium on …, 2023 - ieeexplore.ieee.org
Healthcare systems have recently utilized the Internet of Medical Things (IoMT) to assist
intelligent data collection and decision-making. However, the volume of malicious threats …

Hybrid-shield: Accurate and efficient cross-layer countermeasure for run-time detection and mitigation of cache-based side-channel attacks

H Wang, H Sayadi, A Sasan, S Rafatirad… - Proceedings of the 39th …, 2020 - dl.acm.org
Cache-based Side-Channel Attacks (SCAs) exploit the emerging hardware vulnerabilities to
steal secret information by observing cache access patterns of cryptographic applications …

Deep neural network and transfer learning for accurate hardware-based zero-day malware detection

Z He, A Rezaei, H Homayoun, H Sayadi - Proceedings of the Great …, 2022 - dl.acm.org
In recent years, security researchers have shifted their attentions to the underlying
processors' architecture and proposed Hardware-Based Malware Detection (HMD) …

Cloak & co-locate: Adversarial railroading of resource sharing-based attacks on the cloud

HM Makrani, H Sayadi, N Nazari… - … on Secure and …, 2021 - ieeexplore.ieee.org
The heterogeneity of resources and the diversity of applications on the cloud motivated the
need for resource provisioning systems (RPSs) to meet the users' performance requirements …

Adaptive-hmd: Accurate and cost-efficient machine learning-driven malware detection using microarchitectural events

Y Gao, HM Makrani, M Aliasgari… - 2021 IEEE 27th …, 2021 - ieeexplore.ieee.org
To address the high complexity and computational overheads of conventional software-
based detection techniques, Hardware Malware Detection (HMD) has shown promising …

Phased-guard: Multi-phase machine learning framework for detection and identification of zero-day microarchitectural side-channel attacks

H Wang, H Sayadi, G Kolhe, A Sasan… - 2020 ieee 38th …, 2020 - ieeexplore.ieee.org
Microarchitectural Side-Channel Attacks (SCAs) have emerged recently to compromise the
security of computer systems by exploiting the existing processors' hardware vulnerabilities …

Intelligent malware detection based on hardware performance counters: A comprehensive survey

H Sayadi, Z He, HM Makrani… - 2024 25th International …, 2024 - ieeexplore.ieee.org
The growing complexity of contemporary computing systems heightens susceptibility to
emerging cyber threats. Recent advancements in computer architecture security leverage …