Professional Documents
Culture Documents
Table of Contents
Overview................................................................................................................................ 3
Discussion of findings............................................................................................................. 5
Comparison............................................................................................................................ 7
Conclusion............................................................................................................................. 8
References........................................................................................................................... 10
3
Overview
autonomous concepts from running a factory to driving a car, today's most concerning
challenge faced by the world's developers is privacy. With the advancement of modern
technology evaluation on AI technology, self-driving cars are no longer just a concept; many
well-known automobiles industry has introduced their self-driving car model. But the
irresistible chaos of content popularity, the wide range of customer tastes and expectations,
and personal privacy issues pose challenges for developing active content caching solutions
such as Wi-Fi or cellular networks in order to access the corresponding content hosts to aid
onboard units (OBUs) in providing the recently demanded infotainment items that are not
available at the OBUs. If the information required by the user is not stored in OBU, it will
automatically seek information from a neighbouring Road Side Unit (RSU) with a stronger
connection. Self-driving automobiles can quickly get information from the nearby RSU. In
case the information is not found in RSU, the self-driving vehicles will seek the required
information from other nearby self-driving automobiles through a next-hop base station
(MBS) or the core cloud until the required information is identified and downloaded. In this
scenario, they are exposed to hackers. At present, the Malware identification is still an
However, as obfuscation methods grow more widespread in malware, the scanners can be
readily hacked, allowing the virus to develop new characteristic sequences during execution.
In this paper, there will be a discussion of two papers where the privacy-related issues of
4
modern self-driving vehicles and the importance of Hardware acceleration and machine
Methods of research
The selected two papers are "Performance Monitoring Counter Based Intelligent Malware
Detection and Design Alternatives" and "Route-Based Proactive Content Caching Using Self-
Attention in Hierarchical Federated Learning." This section discusses how the authors of
these two papers conducted the research. In paper one, "Performance Monitoring Counter
Based Intelligent Malware Detection and Design Alternatives", the researcher utilized
experimental research methodology, where the researcher in the paper addressed Statistical
tradeoff calculation of identification time and accuracy, and design aspects for hardware-
based malware detection [1]. To investigate key issues of PMC-based malware detection, the
distribution-based feature selection; (iii) tradeoff analysis of detection time and accuracy; and
(iv) providing architectural design alternatives for hardware-based malware detection [1].
The researcher in the paper proposes two architectural designs for more effective malware
and "acceleration hardware with existing PMCs.'' for malware characterization, the researcher
utilizes PMC, which gathers data from the microprocessors. In order to collect data from
PMCs, the researcher utilizes Ubuntu 18.04 on the Intel Xeon processors (Skylake
microarchitecture). For gathering architectural data and characterizing each workload from a
view, 20 benign specimens and 20 malware specimens are being used in the research paper.
Researchers have identified a number of features that distinguish between malware and
where the researcher follows both experimental and secondary methods [2]. For secondary
data collection, the researcher utilizes various previously published journals and articles in
order to collect relevant data [2]. Here the researcher critically analyzed all the research
papers related to the data sharing method of self-driving cars. The researcher also mentioned
that most researchers use deep learning approaches to collect user characteristics to make
caching decisions for audiovisual information in self-driving cars [2]. Additionally, the
researcher describes the different methods and steps in collecting the relevant data. By
analyzing the secondary data, the researcher comes to the conclusion that most contemporary
studies, as well as those mentioned previously, are centred on centralized content caching.
The traditional centralized system, on the other hand, is hypersensitive to privacy, and not all
self-driving cars want to share the raw data/information with the central cloud or server (RSU
and MBS). In the experimental section, the researcher utilizes Self-driving cars, which are
public transport vehicles and go on the regular local routes daily [2].
Discussion of findings
From paper one, it is identified that malware is evolving day by day; therefore, malware
detection through hardware solutions has now become more crucial than ever. PMC's
behavioural data is being utilized in several current hardware solutions [1]. In malware
detection, there is a limited amount of data provided; therefore, the architectural selection of
features has become very challenging in terms of providing high-quality data. In order to
overcome this challenging factor, the researcher has proposed a metric that is called DoD or
Degree of Distribution. The results of the experiments conducted by the researcher showed
malware from specimens as well as can deliver extremely accurate results. This extremely
accurate result is generated through the collaboration of machine learning methods and
acceleration components, as well as more PMC registers, are indeed essential for even more
extensively used, it is quite likely that malicious software developers will be informed of the
extreme usage. Therefore, several steps are needed to be taken by the developers, including
updating the customized characteristics on a regular basis to keep them up to speed with the
newer malicious behaviours [1]. More precise architectural designs for a particular
acceleration will be examined in future studies to gain more efficiency in chip size, cost and
module.
In paper two, the researcher discovered that since OBUs mainly cache content for quick and
periodic accessibility, active content caching can be a promising approach to managing the
indexed spread of content queries from different users in self-driving vehicles. Moreover, the
researcher also found out that due to insufficient caching capability and the constant presence
of user queries for different items, OBUs cannot successfully select any content. In the
research paper, researchers have discussed in more detail the issue of active data caching in
researchers have demonstrated a self-focused strategy for active data caching in self-driving
automobiles [2]. In addition, researchers have used interleaved self-focus and LSTM-based
The FL method was utilized by the researcher in order to communicate these sets of
parameters with RSUs and MBS for use in regional (and global) design construction using
7
modelling aggregation at two different levels: RSUs and MBS. The simulation results show
that the proposed method improves the accuracy of cache detection, reduces content retrieval
costs and optimizes cache usage compared to conventional caching methods [2].
Comparison
In both papers, the researcher is concerned the data privacy and mentioned their concerns
about privacy issues that occur during sharing data or due to hacking. In both cases, the
victim has to face a lot of trouble. Therefore, the user needs to secure their data. In paper one,
it is observed that the researcher focuses on machine learning technology in order to improve
security issues. According to [1];[2], unfortunately, there are a number of problems with
using machine learning in security. For instance, useful label datasets are few, and the
computing workload is inadequate to overcome the massive amounts of data. In paper one,
the researcher stated that machine learning technology could successfully be able to classify
These two papers are based on two different problems; where the first paper described the
importance of hardware solutions in terms of malware detection [1]. The researcher stated
that statistical variations between malware workloads and benign workloads are defined
using data from performance counters to underline the significance of selecting architectural
elements for malware detection [1]. In the paper, the researcher stated that deleting malware
from a system through software-based static signature approaches might harm the host
processors; hardware security like ARM TRUSTZONE can easily delete malware without
harming the host processor [1]. The researcher also showed the concern that in terms of
deleting the malware, the hardware also needs to share physical resources, which might lead
to the risk of information leakage, but utilizing machine learning technology, this risk can
easily be minimized.
8
In paper two, the researcher showed the concern of data sharing methods performed by
modern self-driving cars. In order to address data sharing concerns, the researcher
investigated the role of proactive content caching methods within autonomous vehicles. In a
prediction model. To find out the characteristics of the popularity of domestic content in self-
driving automobiles, the researchers applied a self-focus strategy combined with an LSTM-
based instinct [2]. While leveraging the popular contents from other nearby vehicles, there
come the privacy issues; in order to deal with the issue, the researcher utilized a privacy-
based algorithm. The researcher deployed this model to enhance the security of the self-
By critically analyzing both research papers carefully, it is identified that privacy is a serious
matter that most developers are determined to solve. Data theft, data loss and inauthentic
access to the system cause several problems as well as users. Therefore, in terms of
minimizing the effect, the first paper provides the most contribution to the present research.
The self-driving cars are new to the modern world, and fewer people have access to self-
driving cars; although the research paper is important at present concerning the fact that most
businesses and individuals are exposed to data theft, the first paper's contribution is more
effective than the second paper. Using machine learning algorithms in terms of reducing data
theft is an effective way. From both papers, it is clearly seen that machine learning
technology not only can help to minimize the cyber- attack additionally it holds many
promises. Therefore, many researchers are constantly working on this novel technology and
Conclusion
From the overall discussion, it is observed that, at present, where everything runs through
technology, data is considered the base of the technology. The issue of data theft and data
loss harms both individuals and businesses. The concept of implementing AI technology to
run various operations has gained popularity, and with rising popularity, the hackers are
targeting this novel technology. Therefore, researchers and developers need to develop new
methods of utilizing machine learning technology in terms of enhancing the security of the
system. In both papers, it is observed that the researcher lavaged the machine learning
technology to enhance the security of their proposed systems. In paper one, machine learning
technology is being utilized for the classification of malware. Additionally, the selection of a
machine learning algorithm is also considered one of the most important steps. In the second
paper, the researcher utilizes the Federated Averaging (FedAvg) algorithm, which is a
machine learning technology also has some disadvantages due to lack of research, by
considering the contribution of this novel technology in the modern world, many researchers
and developers are constantly working on this technology to enhance its functionality.
10
References
malware detection and design alternatives', IEEE Access, τ. 10, σσ. 28685–28692, 2022.
[2] S. Khanal, K. Thar, και E.-N. Huh, ‘Route-based proactive content caching using self-
attention in hierarchical federated learning’, IEEE Access, τ. 10, σσ. 29514–29527, 2022.