{"id":"https://openalex.org/W2319159802","doi":"https://doi.org/10.1145/2857055","title":"Hardware Performance Counter-Based Malware Identification and Detection with Adaptive Compressive Sensing","display_name":"Hardware Performance Counter-Based Malware Identification and Detection with Adaptive Compressive Sensing","publication_year":2016,"publication_date":"2016-03-28","ids":{"openalex":"https://openalex.org/W2319159802","doi":"https://doi.org/10.1145/2857055","mag":"2319159802"},"language":"en","primary_location":{"id":"doi:10.1145/2857055","is_oa":true,"landing_page_url":"https://doi.org/10.1145/2857055","pdf_url":"http://dl.acm.org/ft_gateway.cfm?id=2857055&type=pdf","source":{"id":"https://openalex.org/S26056741","display_name":"ACM Transactions on Architecture and Code Optimization","issn_l":"1544-3566","issn":["1544-3566","1544-3973"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Transactions on Architecture and Code Optimization","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"bronze","oa_url":"http://dl.acm.org/ft_gateway.cfm?id=2857055&type=pdf","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101713354","display_name":"Xueyang Wang","orcid":"https://orcid.org/0000-0003-0390-9909"},"institutions":[{"id":"https://openalex.org/I57206974","display_name":"New York University","ror":"https://ror.org/0190ak572","country_code":"US","type":"education","lineage":["https://openalex.org/I57206974"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Xueyang Wang","raw_affiliation_strings":["New York University, Brooklyn, NY"],"affiliations":[{"raw_affiliation_string":"New York University, Brooklyn, NY","institution_ids":["https://openalex.org/I57206974"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5109489758","display_name":"Sek Chai","orcid":null},"institutions":[{"id":"https://openalex.org/I1298353152","display_name":"SRI International","ror":"https://ror.org/05s570m15","country_code":"US","type":"nonprofit","lineage":["https://openalex.org/I1298353152"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Sek Chai","raw_affiliation_strings":["SRI International, Princeton, NJ"],"affiliations":[{"raw_affiliation_string":"SRI International, Princeton, NJ","institution_ids":["https://openalex.org/I1298353152"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5057011125","display_name":"Michael Isnardi","orcid":null},"institutions":[{"id":"https://openalex.org/I1298353152","display_name":"SRI International","ror":"https://ror.org/05s570m15","country_code":"US","type":"nonprofit","lineage":["https://openalex.org/I1298353152"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Michael Isnardi","raw_affiliation_strings":["SRI International, Princeton, NJ"],"affiliations":[{"raw_affiliation_string":"SRI International, Princeton, NJ","institution_ids":["https://openalex.org/I1298353152"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5072866818","display_name":"Sehoon Lim","orcid":null},"institutions":[{"id":"https://openalex.org/I1298353152","display_name":"SRI International","ror":"https://ror.org/05s570m15","country_code":"US","type":"nonprofit","lineage":["https://openalex.org/I1298353152"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Sehoon Lim","raw_affiliation_strings":["SRI International, Princeton, NJ"],"affiliations":[{"raw_affiliation_string":"SRI International, Princeton, NJ","institution_ids":["https://openalex.org/I1298353152"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5059648257","display_name":"Ramesh Karri","orcid":"https://orcid.org/0000-0001-7989-5617"},"institutions":[{"id":"https://openalex.org/I57206974","display_name":"New York University","ror":"https://ror.org/0190ak572","country_code":"US","type":"education","lineage":["https://openalex.org/I57206974"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Ramesh Karri","raw_affiliation_strings":["New York University, Brooklyn, NY"],"affiliations":[{"raw_affiliation_string":"New York University, Brooklyn, NY","institution_ids":["https://openalex.org/I57206974"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5101713354"],"corresponding_institution_ids":["https://openalex.org/I57206974"],"apc_list":null,"apc_paid":null,"fwci":6.0793,"has_fulltext":true,"cited_by_count":64,"citation_normalized_percentile":{"value":0.96588832,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":99},"biblio":{"volume":"13","issue":"1","first_page":"1","last_page":"23"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10500","display_name":"Sparse and Compressive Sensing Techniques","score":0.9936000108718872,"subfield":{"id":"https://openalex.org/subfields/2206","display_name":"Computational Mechanics"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10500","display_name":"Sparse and Compressive Sensing Techniques","score":0.9936000108718872,"subfield":{"id":"https://openalex.org/subfields/2206","display_name":"Computational Mechanics"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9861999750137329,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9832000136375427,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8595734238624573},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.6446027159690857},{"id":"https://openalex.org/keywords/compressed-sensing","display_name":"Compressed sensing","score":0.631987452507019},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.5665181279182434},{"id":"https://openalex.org/keywords/bandwidth","display_name":"Bandwidth (computing)","score":0.5439621210098267},{"id":"https://openalex.org/keywords/identification","display_name":"Identification (biology)","score":0.4637300372123718},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.4373273253440857},{"id":"https://openalex.org/keywords/computer-hardware","display_name":"Computer hardware","score":0.40913480520248413},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.39819207787513733},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.3126949667930603},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.1541747748851776},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.1057167649269104}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8595734238624573},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.6446027159690857},{"id":"https://openalex.org/C124851039","wikidata":"https://www.wikidata.org/wiki/Q2665459","display_name":"Compressed sensing","level":2,"score":0.631987452507019},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.5665181279182434},{"id":"https://openalex.org/C2776257435","wikidata":"https://www.wikidata.org/wiki/Q1576430","display_name":"Bandwidth (computing)","level":2,"score":0.5439621210098267},{"id":"https://openalex.org/C116834253","wikidata":"https://www.wikidata.org/wiki/Q2039217","display_name":"Identification (biology)","level":2,"score":0.4637300372123718},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.4373273253440857},{"id":"https://openalex.org/C9390403","wikidata":"https://www.wikidata.org/wiki/Q3966","display_name":"Computer hardware","level":1,"score":0.40913480520248413},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.39819207787513733},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.3126949667930603},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.1541747748851776},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.1057167649269104},{"id":"https://openalex.org/C59822182","wikidata":"https://www.wikidata.org/wiki/Q441","display_name":"Botany","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2857055","is_oa":true,"landing_page_url":"https://doi.org/10.1145/2857055","pdf_url":"http://dl.acm.org/ft_gateway.cfm?id=2857055&type=pdf","source":{"id":"https://openalex.org/S26056741","display_name":"ACM Transactions on Architecture and Code Optimization","issn_l":"1544-3566","issn":["1544-3566","1544-3973"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Transactions on Architecture and Code Optimization","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.1145/2857055","is_oa":true,"landing_page_url":"https://doi.org/10.1145/2857055","pdf_url":"http://dl.acm.org/ft_gateway.cfm?id=2857055&type=pdf","source":{"id":"https://openalex.org/S26056741","display_name":"ACM Transactions on Architecture and Code Optimization","issn_l":"1544-3566","issn":["1544-3566","1544-3973"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Transactions on Architecture and Code Optimization","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2319159802.pdf","grobid_xml":"https://content.openalex.org/works/W2319159802.grobid-xml"},"referenced_works_count":33,"referenced_works":["https://openalex.org/W252768410","https://openalex.org/W340244495","https://openalex.org/W1595579786","https://openalex.org/W1829709575","https://openalex.org/W1977888315","https://openalex.org/W1986465830","https://openalex.org/W2007388836","https://openalex.org/W2015418199","https://openalex.org/W2031839259","https://openalex.org/W2034053858","https://openalex.org/W2071289869","https://openalex.org/W2088503757","https://openalex.org/W2090614493","https://openalex.org/W2103848646","https://openalex.org/W2104266187","https://openalex.org/W2109219878","https://openalex.org/W2113261561","https://openalex.org/W2122315118","https://openalex.org/W2122379760","https://openalex.org/W2127154613","https://openalex.org/W2127271355","https://openalex.org/W2156420172","https://openalex.org/W2161160262","https://openalex.org/W2166844173","https://openalex.org/W2171929398","https://openalex.org/W2290702548","https://openalex.org/W2912034700","https://openalex.org/W2950774332","https://openalex.org/W3004897868","https://openalex.org/W3007346474","https://openalex.org/W4245268430","https://openalex.org/W4247881240","https://openalex.org/W4251100134"],"related_works":["https://openalex.org/W2097492617","https://openalex.org/W2753240997","https://openalex.org/W1764168690","https://openalex.org/W2537959205","https://openalex.org/W2740895074","https://openalex.org/W2772446090","https://openalex.org/W3152891574","https://openalex.org/W2249809453","https://openalex.org/W4284893819","https://openalex.org/W4316881845"],"abstract_inverted_index":{"Hardware":[0],"Performance":[1],"Counter-based":[2],"(HPC)":[3],"runtime":[4],"checking":[5],"is":[6],"an":[7,84],"effective":[8],"way":[9],"to":[10,20,52],"identify":[11],"malicious":[12,18],"behaviors":[13],"of":[14],"malware":[15],"and":[16,38,97],"detect":[17],"modifications":[19],"a":[21,43,53],"legitimate":[22],"program\u2019s":[23],"control":[24],"flow.":[25],"To":[26,59],"reduce":[27],"the":[28,31,61,67,95],"overhead":[29],"in":[30],"monitored":[32],"system":[33],"which":[34],"has":[35],"limited":[36],"storage":[37],"computing":[39],"resources,":[40],"we":[41],"present":[42],"\u201csample-locally-analyze-remotely\u201d":[44],"technique.":[45],"The":[46,80],"sampled":[47],"HPC":[48,69],"data":[49],"are":[50,71],"sent":[51],"remote":[54],"server":[55],"for":[56,65],"further":[57],"analysis.":[58],"minimize":[60],"I/O":[62,86],"bandwidth":[63,87],"required":[64],"transmission,":[66],"fine-grained":[68],"profiles":[70],"compressed":[72],"into":[73],"much":[74],"smaller":[75],"vectors":[76],"with":[77],"Compressive":[78,91],"Sensing.":[79],"experimental":[81],"results":[82],"demonstrate":[83],"80%":[85],"reduction":[88],"after":[89],"applying":[90],"Sensing,":[92],"without":[93],"compromising":[94],"detection":[96],"identification":[98],"capabilities.":[99]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":5},{"year":2023,"cited_by_count":5},{"year":2022,"cited_by_count":6},{"year":2021,"cited_by_count":14},{"year":2020,"cited_by_count":12},{"year":2019,"cited_by_count":10},{"year":2018,"cited_by_count":6},{"year":2017,"cited_by_count":2},{"year":2016,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
