{"id":"https://openalex.org/W2017608668","doi":"https://doi.org/10.1145/1086297.1086305","title":"Anomalous path detection with hardware support","display_name":"Anomalous path detection with hardware support","publication_year":2005,"publication_date":"2005-09-24","ids":{"openalex":"https://openalex.org/W2017608668","doi":"https://doi.org/10.1145/1086297.1086305","mag":"2017608668"},"language":"en","primary_location":{"id":"doi:10.1145/1086297.1086305","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1086297.1086305","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2005 international conference on Compilers, architectures and synthesis for embedded systems","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101978979","display_name":"Tao Zhang","orcid":"https://orcid.org/0000-0002-5549-5966"},"institutions":[{"id":"https://openalex.org/I130701444","display_name":"Georgia Institute of Technology","ror":"https://ror.org/01zkghx44","country_code":"US","type":"education","lineage":["https://openalex.org/I130701444"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Tao Zhang","raw_affiliation_strings":["Georgia Institute of Technology, Atlanta, GA","Georgia Institute of Technology Atlanta, GA"],"affiliations":[{"raw_affiliation_string":"Georgia Institute of Technology, Atlanta, GA","institution_ids":["https://openalex.org/I130701444"]},{"raw_affiliation_string":"Georgia Institute of Technology Atlanta, GA","institution_ids":["https://openalex.org/I130701444"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5103447779","display_name":"Xiaotong Zhuang","orcid":null},"institutions":[{"id":"https://openalex.org/I130701444","display_name":"Georgia Institute of Technology","ror":"https://ror.org/01zkghx44","country_code":"US","type":"education","lineage":["https://openalex.org/I130701444"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Xiaotong Zhuang","raw_affiliation_strings":["Georgia Institute of Technology, Atlanta, GA","Georgia Institute of Technology Atlanta, GA"],"affiliations":[{"raw_affiliation_string":"Georgia Institute of Technology, Atlanta, GA","institution_ids":["https://openalex.org/I130701444"]},{"raw_affiliation_string":"Georgia Institute of Technology Atlanta, GA","institution_ids":["https://openalex.org/I130701444"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5061235810","display_name":"Santosh Pande","orcid":"https://orcid.org/0000-0001-6723-8062"},"institutions":[{"id":"https://openalex.org/I130701444","display_name":"Georgia Institute of Technology","ror":"https://ror.org/01zkghx44","country_code":"US","type":"education","lineage":["https://openalex.org/I130701444"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Santosh Pande","raw_affiliation_strings":["Georgia Institute of Technology, Atlanta, GA","Georgia Institute of Technology Atlanta, GA"],"affiliations":[{"raw_affiliation_string":"Georgia Institute of Technology, Atlanta, GA","institution_ids":["https://openalex.org/I130701444"]},{"raw_affiliation_string":"Georgia Institute of Technology Atlanta, GA","institution_ids":["https://openalex.org/I130701444"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5047140382","display_name":"Wenke Lee","orcid":"https://orcid.org/0000-0003-2761-1277"},"institutions":[{"id":"https://openalex.org/I130701444","display_name":"Georgia Institute of Technology","ror":"https://ror.org/01zkghx44","country_code":"US","type":"education","lineage":["https://openalex.org/I130701444"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Wenke Lee","raw_affiliation_strings":["Georgia Institute of Technology, Atlanta, GA","Georgia Institute of Technology Atlanta, GA"],"affiliations":[{"raw_affiliation_string":"Georgia Institute of Technology, Atlanta, GA","institution_ids":["https://openalex.org/I130701444"]},{"raw_affiliation_string":"Georgia Institute of Technology Atlanta, GA","institution_ids":["https://openalex.org/I130701444"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5101978979"],"corresponding_institution_ids":["https://openalex.org/I130701444"],"apc_list":null,"apc_paid":null,"fwci":5.198,"has_fulltext":false,"cited_by_count":68,"citation_normalized_percentile":{"value":0.95777119,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"43","last_page":"54"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7977519631385803},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.6551946997642517},{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.6123203039169312},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.5155699253082275},{"id":"https://openalex.org/keywords/granularity","display_name":"Granularity","score":0.5112802982330322},{"id":"https://openalex.org/keywords/profiling","display_name":"Profiling (computer programming)","score":0.5102236270904541},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.49878835678100586},{"id":"https://openalex.org/keywords/hardware-trojan","display_name":"Hardware Trojan","score":0.4805477261543274},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.37821483612060547},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3417537212371826},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.3333444595336914},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.2728089988231659}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7977519631385803},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.6551946997642517},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.6123203039169312},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.5155699253082275},{"id":"https://openalex.org/C177774035","wikidata":"https://www.wikidata.org/wiki/Q1246948","display_name":"Granularity","level":2,"score":0.5112802982330322},{"id":"https://openalex.org/C187191949","wikidata":"https://www.wikidata.org/wiki/Q1138496","display_name":"Profiling (computer programming)","level":2,"score":0.5102236270904541},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.49878835678100586},{"id":"https://openalex.org/C2780873074","wikidata":"https://www.wikidata.org/wiki/Q5656397","display_name":"Hardware Trojan","level":3,"score":0.4805477261543274},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.37821483612060547},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3417537212371826},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3333444595336914},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.2728089988231659},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.0},{"id":"https://openalex.org/C174333608","wikidata":"https://www.wikidata.org/wiki/Q19635","display_name":"Trojan","level":2,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1145/1086297.1086305","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1086297.1086305","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2005 international conference on Compilers, architectures and synthesis for embedded systems","raw_type":"proceedings-article"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.134.1619","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.134.1619","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://cs.ucsb.edu/~chong/290N-F06/anomaly-detection.pdf","raw_type":"text"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.90.7374","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.90.7374","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://www.cc.gatech.edu/people/home/zhangtao/files/cases05.pdf","raw_type":"text"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/9","score":0.6399999856948853,"display_name":"Industry, innovation and infrastructure"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":30,"referenced_works":["https://openalex.org/W1535244464","https://openalex.org/W1586807939","https://openalex.org/W1587981097","https://openalex.org/W1655226010","https://openalex.org/W1832277845","https://openalex.org/W1877773550","https://openalex.org/W1947347140","https://openalex.org/W1987238172","https://openalex.org/W2032094184","https://openalex.org/W2058235668","https://openalex.org/W2075325892","https://openalex.org/W2084965140","https://openalex.org/W2087671069","https://openalex.org/W2090181646","https://openalex.org/W2099986681","https://openalex.org/W2100666033","https://openalex.org/W2106649514","https://openalex.org/W2108112890","https://openalex.org/W2108255910","https://openalex.org/W2123886726","https://openalex.org/W2128217000","https://openalex.org/W2137569638","https://openalex.org/W2167332015","https://openalex.org/W2626770668","https://openalex.org/W2752929869","https://openalex.org/W4214931895","https://openalex.org/W4290757805","https://openalex.org/W4300782482","https://openalex.org/W4300807510","https://openalex.org/W6635038715"],"related_works":["https://openalex.org/W2931688134","https://openalex.org/W2377919138","https://openalex.org/W2378857091","https://openalex.org/W2999756192","https://openalex.org/W103652678","https://openalex.org/W4226090359","https://openalex.org/W2059697060","https://openalex.org/W936373746","https://openalex.org/W4382701072","https://openalex.org/W4256502920"],"abstract_inverted_index":{"Embedded":[0],"systems":[1,23,30,61,115],"are":[2,12,116,175],"being":[3],"deployed":[4,62],"as":[5,67,161],"a":[6,72,150,201],"part":[7],"of":[8,154,169,209,241],"critical":[9,64],"infrastructures":[10,65],"and":[11,46,90,109,120,184,213,245,256],"vulnerable":[13],"to":[14,18,27,128,137,177,204,214],"malicious":[15],"attacks":[16,242],"due":[17,127],"internet":[19],"accessibility.":[20],"Intrusion":[21],"detection":[22,80,114,236,255],"have":[24],"been":[25],"proposed":[26],"protect":[28],"computer":[29],"from":[31,123],"unauthorized":[32],"penetration.":[33],"Detecting":[34],"an":[35,92,95,249],"attack":[36],"early":[37],"on":[38],"pays":[39],"off":[40],"since":[41],"further":[42],"damage":[43],"is":[44,56,97,102,172],"avoided":[45],"in":[47,63,133,163,180,191],"some":[48],"cases,":[49],"resilient":[50],"recovery":[51],"could":[52,75,188],"be":[53],"adopted.":[54],"This":[55],"especially":[57],"important":[58,167],"for":[59,251],"embedded":[60,194],"such":[66,170],"Power":[68],"Grids":[69],"etc.":[70],"where":[71],"timely":[73],"intervention":[74],"save":[76],"catastrophes.":[77],"An":[78],"intrusion":[79,113],"system":[81,106],"monitors":[82],"dynamic":[83],"program":[84,88,147,206],"behavior":[85,89,101,148],"against":[86],"normal":[87,100],"raises":[91],"alert":[93],"when":[94],"anomaly":[96,250],"detected.":[98],"The":[99],"learnt":[103],"by":[104],"the":[105,138,164,185],"through":[107],"training":[108],"profiling.However,":[110],"all":[111],"current":[112],"purely":[117],"software":[118,142,227],"based":[119,143,228],"thus":[121,156,257],"suffer":[122],"large":[124],"performance":[125,140,232],"degradation":[126],"constant":[129],"monitoring":[130],"operations":[131],"inserted":[132],"application":[134],"code.":[135],"Due":[136],"potential":[139,158],"overheads,":[141],"solutions":[144,229],"cannot":[145],"monitor":[146],"at":[149],"very":[151],"fine":[152],"level":[153],"granularity,":[155],"leaving":[157],"security":[159],"holes":[160],"shown":[162],"literature.":[165],"Another":[166],"drawback":[168],"methods":[171],"that":[173],"they":[174],"unable":[176],"detect":[178,215],"intrusions":[179],"near":[181,252],"real":[182,192,253],"time":[183,186,193,254],"lag":[187],"prove":[189],"disastrous":[190],"systems.":[195],"In":[196],"this":[197],"paper,":[198],"we":[199],"propose":[200],"hardware-based":[202],"approach":[203,222],"verify":[205],"execution":[207],"paths":[208],"target":[210],"applications":[211],"dynamically":[212],"anomalous":[216],"executions.":[217],"With":[218],"hardware":[219],"support,":[220],"our":[221],"offers":[223],"multiple":[224],"advantages":[225],"over":[226],"including":[230],"minor":[231],"degradation,":[233],"much":[234,258],"stronger":[235],"capability":[237],"(a":[238],"larger":[239],"variety":[240],"get":[243],"detected)":[244],"zero-latency":[246],"reaction":[247],"upon":[248],"better":[259],"security.":[260]},"counts_by_year":[{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":10},{"year":2018,"cited_by_count":3},{"year":2017,"cited_by_count":2},{"year":2015,"cited_by_count":5},{"year":2014,"cited_by_count":6},{"year":2013,"cited_by_count":4},{"year":2012,"cited_by_count":7}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
