Malware Searching Methods at FML-Architecture
A matrix-logical method for diagnosing malicious components is being developed, which has high performance due to parallel operations. A vector-matrix method for searching malware in CPS is presented, which uses functionality and malware responses to test datasets. All models and algorithms have bee...
Saved in:
| Published in | East-West Design and Test Symposium pp. 1 - 5 |
|---|---|
| Main Authors | , |
| Format | Conference Proceeding |
| Language | English |
| Published |
IEEE
10.09.2021
|
| Subjects | |
| Online Access | Get full text |
| ISSN | 2472-761X |
| DOI | 10.1109/EWDTS52692.2021.9581024 |
Cover
| Abstract | A matrix-logical method for diagnosing malicious components is being developed, which has high performance due to parallel operations. A vector-matrix method for searching malware in CPS is presented, which uses functionality and malware responses to test datasets. All models and algorithms have been verified in the program code and are ready for implementation in the cloud federated machine learning system for malware detection. The algorithms proposed in the study have linear or quadratic computational complexity. Due to the parallel execution of register logical operations, procedures for analyzing matrices or tables outperform their analogs by two to 10 times in performance. |
|---|---|
| AbstractList | A matrix-logical method for diagnosing malicious components is being developed, which has high performance due to parallel operations. A vector-matrix method for searching malware in CPS is presented, which uses functionality and malware responses to test datasets. All models and algorithms have been verified in the program code and are ready for implementation in the cloud federated machine learning system for malware detection. The algorithms proposed in the study have linear or quadratic computational complexity. Due to the parallel execution of register logical operations, procedures for analyzing matrices or tables outperform their analogs by two to 10 times in performance. |
| Author | Saprykin, A.S. Hahanov, V.I. |
| Author_xml | – sequence: 1 givenname: V.I. surname: Hahanov fullname: Hahanov, V.I. organization: Kharkiv National University of Radio Electronics,Design Automation Department,Kharkiv,Ukraine – sequence: 2 givenname: A.S. surname: Saprykin fullname: Saprykin, A.S. organization: Kharkiv National University of Radio Electronics,Design Automation Department,Kharkiv,Ukraine |
| BookMark | eNotj0FOwzAQRQ0CiVJyAhbkAi4ztsexl1VpASkRixbBrnLtCQ0qKUqCUG8PiK6-9BZP71-Ks3bfshA3CBNE8Lfzl7vVkpT1aqJA4cSTQ1DmRGS-cGgtGUOg4VSMlCmULCy-Xois798BAC2SVzgSsgq779BxvuTQxW3TvuUVD9t96vMw5IuqlNM_PHAcvjq-Eud12PWcHXcsnhfz1exBlk_3j7NpKRtEN0hKtjZJRRW0K7zT3uqQKAWwhL9RTBuKBlJduyKR8do6dOz8JkZramDWY3H9722Yef3ZNR-hO6yPB_UPHJVFnA |
| ContentType | Conference Proceeding |
| DBID | 6IE 6IL CBEJK RIE RIL |
| DOI | 10.1109/EWDTS52692.2021.9581024 |
| DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Xplore POP ALL IEEE Xplore All Conference Proceedings IEEE Electronic Library (IEL) IEEE Proceedings Order Plans (POP All) 1998-Present |
| DatabaseTitleList | |
| Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Engineering |
| EISBN | 9781665445030 1665445033 |
| EISSN | 2472-761X |
| EndPage | 5 |
| ExternalDocumentID | 9581024 |
| Genre | orig-research |
| GroupedDBID | 6IE 6IF 6IH 6IK 6IL 6IM 6IN AAJGR AAWTH ABLEC ADZIZ ALMA_UNASSIGNED_HOLDINGS BEFXN BFFAM BGNUA BKEBE BPEOZ CBEJK CHZPO IEGSK IPLJI OCL RIE RIL RNS |
| ID | FETCH-LOGICAL-i118t-5d6f4d2c2a387983963ad5da0651445e5b5c40dff87d54936818e89bcc64f0ee3 |
| IEDL.DBID | RIE |
| IngestDate | Wed Aug 27 02:29:03 EDT 2025 |
| IsPeerReviewed | false |
| IsScholarly | false |
| Language | English |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-i118t-5d6f4d2c2a387983963ad5da0651445e5b5c40dff87d54936818e89bcc64f0ee3 |
| PageCount | 5 |
| ParticipantIDs | ieee_primary_9581024 |
| PublicationCentury | 2000 |
| PublicationDate | 2021-Sept.-10 |
| PublicationDateYYYYMMDD | 2021-09-10 |
| PublicationDate_xml | – month: 09 year: 2021 text: 2021-Sept.-10 day: 10 |
| PublicationDecade | 2020 |
| PublicationTitle | East-West Design and Test Symposium |
| PublicationTitleAbbrev | EWDTS |
| PublicationYear | 2021 |
| Publisher | IEEE |
| Publisher_xml | – name: IEEE |
| SSID | ssj0001615921 |
| Score | 1.7726877 |
| Snippet | A matrix-logical method for diagnosing malicious components is being developed, which has high performance due to parallel operations. A vector-matrix method... |
| SourceID | ieee |
| SourceType | Publisher |
| StartPage | 1 |
| SubjectTerms | cloud-edge computing Computational modeling Computer viruses cyber-physical system logic-vector analysis Machine learning Machine learning algorithms malware malware detection ML-computing Neural networks Productivity sandbox Search problems signature |
| Title | Malware Searching Methods at FML-Architecture |
| URI | https://ieeexplore.ieee.org/document/9581024 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LSwMxEB7anvTioxXf7MGj2e4ru8lRtKWIK4It9lbymIAordRdBH-9ye7aVvHgLQzkffhmkm_mA7hQNNAZF4qY0DCScDREWNQhWMnBMSWjqpRSfp-OJsntlE5bcLnKhUHEinyGvmtWf_l6oUr3VNbnlFk8TNrQzlha52qt31MsNPMobChcYcD7g6eb8aMT0Hb5VlHoN71_yKhUKDLcgfx7_po88uKXhfTV56_SjP9d4C701vl63sMKifaghfN92N4oNdgFkovXD7FEr-YXW5uXV-LR754ovGF-R642vhR6MBkOxtcj0kglkGcbIRSE6tQkOlKRiFnGrdOTxkJTLayDYSMmilRSlQTaGJZpGxHGqcVpZFwqlSYmQIwPoDNfzPEQPGmdIMU0F1loEgyM1DbCEUpqagdFGh9B12189lZXw5g1ez7-23wCW-7wHcMiDE6hUyxLPLMwXsjz6v6-AIPzm4M |
| linkProvider | IEEE |
| linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LSwMxEB5qPagXH634dg8ezXYfye7mKNpStVsEW-yt5DEBUVqpWwR_vdmHbRUP3sJAQoYcvpnMN_MBXCjm6ZgLRYxvEkI5GiIs6hAs5OASJYNilFLaj7pDejdioxpcLnphELEgn6GbL4tavp6qef5V1uIssXhI12CdUUpZ2a21_FGx4MwDvyJx-R5vtZ9uBo-5hHbecRX4brX_h5BKgSOdbUi_b1DSR17ceSZd9flrOON_r7gDzWXHnvOwwKJdqOFkD7ZWhg02gKTi9UPM0CkZxtbmpIV89LsjMqeT9sjVSlGhCcNOe3DdJZVYAnm2OUJGmI4M1YEKRJjE3IY9USg008KGGDZnYsgkU9TTxiSxtjlhGFmkxoRLpSJqPMRwH-qT6QQPwJE2DFKJ5iL2DUXPSG1zHKGkZvZQZOEhNHLHx2_lPIxx5fPR3-Zz2OgO0t64d9u_P4bN_CFyvoXvnUA9m83x1IJ6Js-Kt_wC3V6e0A |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=East-West+Design+and+Test+Symposium&rft.atitle=Malware+Searching+Methods+at+FML-Architecture&rft.au=Hahanov%2C+V.I.&rft.au=Saprykin%2C+A.S.&rft.date=2021-09-10&rft.pub=IEEE&rft.eissn=2472-761X&rft.spage=1&rft.epage=5&rft_id=info:doi/10.1109%2FEWDTS52692.2021.9581024&rft.externalDocID=9581024 |