Investigating Black-Box Function Recognition Using Hardware Performance Counters

被引:0
|
作者
Shepherd, Carlton [1 ]
Semal, Benjamin [1 ]
Markantonakis, Konstantinos [1 ]
机构
[1] Univ London, Royal Holloway, Egham TW20 0EX, Surrey, England
基金
欧盟地平线“2020”;
关键词
Side-channel analysis; hardware performance counters (HPCs); reverse engineering;
D O I
10.1109/TC.2022.3226302
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
This paper presents new methods and results for recognising black-box program functions using hardware performance counters (HPC), where an investigator can invoke and measure function calls. Important use cases include analysing compiled libraries, e.g., static and dynamic link libraries, and trusted execution environment (TEE) applications. We develop a generic approach to classify a comprehensive set of hardware events, e.g., branch mis-predictions and instruction retirements, to recognise standard benchmarking and cryptographic library functions. This includes various signing, verification and hash functions, and ciphers in numerous modes of operation. Three architectures are evaluated using off-the-shelf Intel/X86-64, ARM, and RISC-V CPUs. Next, we show that several known CVE-numbered OpenSSL vulnerabilities can be detected using HPC differences between patched and unpatched library versions. Further, we demonstrate that standardised cryptographic functions within ARM TrustZone TEE applications can be recognised using non-secure world HPC measurements, applying to platforms that insecurely perturb the performance monitoring unit (PMU) during TEE execution. High accuracy was achieved in all cases (86.22-99.83%) depending on the application, architectural, and compilation assumptions. Lastly, we discuss mitigations, outstanding challenges, and directions for future research.
引用
收藏
页码:2065 / 2079
页数:15
相关论文
共 50 条
  • [31] Using Black-Box Compression Algorithms for Phase Retrieval
    Bakhshizadeh, Milad
    Maleki, Arian
    Jalali, Shirin
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2020, 66 (12) : 7978 - 8001
  • [32] Examining of Shallow Autoencoder on Black-box Attack against Face Recognition
    Vo Ngoc Khoi Nguyen
    Terada, Takamichi
    Nishigaki, Masakatsu
    Ohki, Tetsushi
    2021 ASIA-PACIFIC SIGNAL AND INFORMATION PROCESSING ASSOCIATION ANNUAL SUMMIT AND CONFERENCE (APSIPA ASC), 2021, : 1775 - 1780
  • [33] Using MC/DC as a Black-Box Testing Technique
    Vilkomir, Sergiy
    Baptista, John
    Das, Gourav
    2017 IEEE 28TH ANNUAL SOFTWARE TECHNOLOGY CONFERENCE (STC), 2017,
  • [34] Malware Detection Using Black-Box Neural Method
    Pieczynski, Dominik
    Jedrzejek, Czeslaw
    MULTIMEDIA AND NETWORK INFORMATION SYSTEMS, 2019, 833 : 180 - 189
  • [35] A Practical Black-Box Attack Against Autonomous Speech Recognition Model
    Fan, Wenshu
    Li, Hongwei
    Jiang, Wenbo
    Xu, Guowen
    Lu, Rongxing
    2020 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2020,
  • [36] Using nonlinear black-box models in fault detection
    Zhang, QH
    PROCEEDINGS OF THE 35TH IEEE CONFERENCE ON DECISION AND CONTROL, VOLS 1-4, 1996, : 636 - 637
  • [37] Explaining Black-Box Models Using Interpretable Surrogates
    Kuttichira, Deepthi Praveenlal
    Gupta, Sunil
    Li, Cheng
    Rana, Santu
    Venkatesh, Svetha
    PRICAI 2019: TRENDS IN ARTIFICIAL INTELLIGENCE, PT I, 2019, 11670 : 3 - 15
  • [38] Pothole Detection System Using a Black-box Camera
    Jo, Youngtae
    Ryu, Seungki
    SENSORS, 2015, 15 (11) : 29316 - 29331
  • [39] Explaining Decisions of Black-Box Models Using BARBE
    Motallebi, Mohammad
    Anik, Md Tanvir Alam
    Zaiane, Osmar R.
    DATABASE AND EXPERT SYSTEMS APPLICATIONS, DEXA 2023, PT II, 2023, 14147 : 82 - 97
  • [40] Controllable Inversion of Black-Box Face Recognition Models via Diffusion
    Kansy, Manuel
    Rael, Anton
    Mignone, Graziana
    Naruniec, Jacek
    Schroers, Christopher
    Gross, Markus
    Weber, Romann M.
    2023 IEEE/CVF INTERNATIONAL CONFERENCE ON COMPUTER VISION WORKSHOPS, ICCVW, 2023, : 3159 - 3169