Otros/as autores/as

Universitat Politècnica de Catalunya. Departament d'Arquitectura de Computadors

Universitat Politècnica de Catalunya. Departament d'Enginyeria Minera, Industrial i TIC

Universitat Politècnica de Catalunya. CRAAX - Centre de Recerca d'Arquitectures Avançades de Xarxes

Universitat Politècnica de Catalunya. PM - Programming Models

Universitat Politècnica de Catalunya. CROMAI - Computing Resources Orchestration and Management for AI

Fecha de publicación

2026-01-27



Resumen

Póster presentado en HiPEAC 2026 (Cracovia)


As malware becomes more advanced, there is a growing need for more accurate and robust detection systems. Artificial Intelligence (AI) techniques, particularly those based on machine learning and deep learning, have emerged as powerful tools for identifying and classifying malicious behavior. Can we detect RISC-V Hardware Attacks using a machine learning model analyzing sequences of executed instructions? This work builds a suitable dataset, trains machine learning models and evaluates models in 2 scenarios: known and zero-day attacks, showing that known attacks can be detected with a high accuracy, while zero-day attacks may be detected but depends on the similarity with other trained attacks.


Funded by the European Union. Project number: 101093062.


Preprint

Tipo de documento

External research report

Lengua

Inglés

Documentos relacionados

info:eu-repo/grantAgreement/EC/HE/101093062/EU/Virtual Environment and Tool-boxing for Trustworthy Development of RISC-V based Cloud Services/Vitamin-V

Citación recomendada

Esta citación se ha generado automáticamente.

Derechos

Open Access

Este ítem aparece en la(s) siguiente(s) colección(ones)

E-prints [72896]