Investigating Black-Box Function Recognition Using Hardware Performance Counters

被引:0
|
作者
Shepherd, Carlton [1 ]
Semal, Benjamin [1 ]
Markantonakis, Konstantinos [1 ]
机构
[1] Univ London, Royal Holloway, Egham TW20 0EX, Surrey, England
基金
欧盟地平线“2020”;
关键词
Side-channel analysis; hardware performance counters (HPCs); reverse engineering;
D O I
10.1109/TC.2022.3226302
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
This paper presents new methods and results for recognising black-box program functions using hardware performance counters (HPC), where an investigator can invoke and measure function calls. Important use cases include analysing compiled libraries, e.g., static and dynamic link libraries, and trusted execution environment (TEE) applications. We develop a generic approach to classify a comprehensive set of hardware events, e.g., branch mis-predictions and instruction retirements, to recognise standard benchmarking and cryptographic library functions. This includes various signing, verification and hash functions, and ciphers in numerous modes of operation. Three architectures are evaluated using off-the-shelf Intel/X86-64, ARM, and RISC-V CPUs. Next, we show that several known CVE-numbered OpenSSL vulnerabilities can be detected using HPC differences between patched and unpatched library versions. Further, we demonstrate that standardised cryptographic functions within ARM TrustZone TEE applications can be recognised using non-secure world HPC measurements, applying to platforms that insecurely perturb the performance monitoring unit (PMU) during TEE execution. High accuracy was achieved in all cases (86.22-99.83%) depending on the application, architectural, and compilation assumptions. Lastly, we discuss mitigations, outstanding challenges, and directions for future research.
引用
收藏
页码:2065 / 2079
页数:15
相关论文
共 50 条
  • [21] BLACK-BOX COLLISION ATTACKS ON THE COMPRESSION FUNCTION OF THE GOST HASH FUNCTION
    Courtois, Nicolas T.
    Mourouzis, Theodosis
    SECRYPT 2011: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2011, : 325 - 332
  • [22] Stochastic black-box optimization using multi-fidelity score function estimator
    Agrawal, Atul
    Ravi, Kislaya
    Koutsourelakis, Phaedon-Stelios
    Bungartz, Hans-Joachim
    MACHINE LEARNING-SCIENCE AND TECHNOLOGY, 2025, 6 (01):
  • [23] Black-box modeling of passive systems by rational function approximation
    Gao, R
    Mekonnen, YS
    Beyene, WT
    Schutt-Ainé, JE
    IEEE TRANSACTIONS ON ADVANCED PACKAGING, 2005, 28 (02): : 209 - 215
  • [24] Large-scale Expensive Black-Box Function Optimization
    Rashid, Kashif
    Bailey, William
    Couet, Benoit
    NUMERICAL ANALYSIS AND APPLIED MATHEMATICS (ICNAAM 2012), VOLS A AND B, 2012, 1479 : 1143 - 1146
  • [25] On the impact of objective function transformations on evolutionary and black-box algorithms
    Storch, Tobias
    GECCO 2005: Genetic and Evolutionary Computation Conference, Vols 1 and 2, 2005, : 833 - 840
  • [26] Black-box Attacks Against Neural Binary Function Detection
    Bundt, Joshua
    Davinroy, Michael
    Agadakos, Ioannis
    Oprea, Alina
    Robertson, William
    PROCEEDINGS OF THE 26TH INTERNATIONAL SYMPOSIUM ON RESEARCH IN ATTACKS, INTRUSIONS AND DEFENSES, RAID 2023, 2023, : 1 - 16
  • [27] Black-Box Watermarking and Blockchain for IP Protection of Voiceprint Recognition Model
    Zhang, Jing
    Dai, Long
    Xu, Liaoran
    Ma, Jixin
    Zhou, Xiaoyi
    ELECTRONICS, 2023, 12 (17)
  • [28] A black-box reversible adversarial example for authorizable recognition to shared images
    Xiong, Lizhi
    Wu, Yue
    Yu, Peipeng
    Zheng, Yuhui
    PATTERN RECOGNITION, 2023, 140
  • [29] On the impact of objective function transformations on evolutionary and black-box algorithms
    Tobias Storch
    Genetic Programming and Evolvable Machines, 2006, 7 (2) : 171 - 193
  • [30] On the black-box stand-by recognition strategies in smart homes environments
    Caruso, Mario
    Cerocchi, Adriano
    2014 12TH IEEE INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING (EUC 2014), 2014, : 221 - 226