{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,24]],"date-time":"2025-08-24T01:44:20Z","timestamp":1755999860153,"version":"3.28.0"},"reference-count":30,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,10]]},"DOI":"10.1109\/malware.2017.8323953","type":"proceedings-article","created":{"date-parts":[[2018,3,26]],"date-time":"2018-03-26T17:04:19Z","timestamp":1522083859000},"page":"19-27","source":"Crossref","is-referenced-by-count":12,"title":["Rootkit detection through phase-space analysis of power voltage measurements"],"prefix":"10.1109","author":[{"given":"Joel A.","family":"Dawson","sequence":"first","affiliation":[]},{"given":"J. Todd","family":"McDonald","sequence":"additional","affiliation":[]},{"given":"Jordan","family":"Shropshire","sequence":"additional","affiliation":[]},{"given":"Todd R.","family":"Andel","sequence":"additional","affiliation":[]},{"given":"Patrick","family":"Luckett","sequence":"additional","affiliation":[]},{"given":"Lee","family":"Hively","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"README TXT","year":"2011","key":"ref30"},{"key":"ref10","article-title":"Chipset based approach to detect virtualization malware","author":"bulygin","year":"2008","journal-title":"BlackHat Briefings USA"},{"key":"ref11","article-title":"Using power fingerprinting (PFP) to monitor the integrity and enhance security of computer based systems","author":"reed","year":"2016","journal-title":"United States Patent Patent No US 6621252B2"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/2508148.2485970"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/2459976.2460041"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/2746266.2746279"},{"journal-title":"Beholder Phase-Space Detection of Cyber Events","year":"2013","author":"jim\u00e9nez","key":"ref15"},{"key":"ref16","article-title":"Potentia Est Scientia: Security and Privacy Implications of Energy-Proportional Computing","author":"clark","year":"2012","journal-title":"HOTSEC"},{"key":"ref17","article-title":"Securing cloud infrastructure: unobtrusive techniques for detecting hypervisor compromise","author":"shropshire","year":"2015","journal-title":"ICCSM 2015-3rd International Conference on Cloud Security and Management ICCSM2015"},{"journal-title":"Towards a Malware Detection Framework Based on Power Consumption Monitoring","year":"0","author":"jim\u00e9nez","key":"ref18"},{"journal-title":"Identifying Cyber Anomalies Using CPU Power Consumption and Learning Algorithms","year":"2017","author":"luckett","key":"ref19"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.2172\/366563"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2011.101911.00087"},{"key":"ref27","first-page":"649","article-title":"Phase-space dissimilarity measures of nonlinear dynamics: Industrial and biomedical applications","volume":"6","author":"protopopescu","year":"2005","journal-title":"Recent Res Dev Physics"},{"key":"ref3","article-title":"sKyWIper (aka Flame aka Flamer): A complex malware for targeted attacks","author":"bencs\u00e1th","year":"2012","journal-title":"CrySyS Lab Budapest"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2006.180"},{"journal-title":"Data Collection for Cyber Anomaly Event Detection","year":"2015","author":"hubbard","key":"ref29"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/2746266.2746267"},{"key":"ref8","article-title":"WattsUpDoc: Power side channels to nonintrusively discover untargeted malware on embedded medical devices","author":"clark","year":"2013","journal-title":"Proceedings of USENIX Workshop on Health Information Technologies"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-48737-3_4"},{"journal-title":"Countdown to Zero Day Stuxnet and the Launch of the World's First Digital Weapon","year":"2014","author":"zetter","key":"ref2"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04342-0_13"},{"journal-title":"The Rootkit Arsenal Escape and Evasion in the Dark Corners of the System","year":"2012","author":"blunden","key":"ref1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0091924"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-13062-5_4"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1063\/1.2159147"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/BSEC.2013.6618498"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1063\/1.3187791"},{"journal-title":"Prognostication of Helicopter Failure","year":"2009","author":"hively","key":"ref26"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1097\/00004691-200105000-00003"}],"event":{"name":"2017 12th International Conference on Malicious and Unwanted Software (MALWARE)","start":{"date-parts":[[2017,10,11]]},"location":"Fajardo","end":{"date-parts":[[2017,10,14]]}},"container-title":["2017 12th International Conference on Malicious and Unwanted Software (MALWARE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8318523\/8323944\/08323953.pdf?arnumber=8323953","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,4,16]],"date-time":"2018-04-16T16:45:38Z","timestamp":1523897138000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8323953\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,10]]},"references-count":30,"URL":"https:\/\/doi.org\/10.1109\/malware.2017.8323953","relation":{},"subject":[],"published":{"date-parts":[[2017,10]]}}}