Profiling with trust: system monitoring from trusted execution environments

被引:0
|
作者
Eichler, Christian [1 ]
Roeckl, Jonas [2 ]
Jung, Benedikt [3 ]
Schlenk, Ralph [3 ]
Mueller, Tilo [4 ]
Hoenig, Timo [1 ]
机构
[1] Ruhr Univ Bochum, Bochum, Germany
[2] FAU Erlangen Nurnberg, Erlangen, Germany
[3] Nokia Solut & Networks GmbH & Co KG, Nurnberg, Germany
[4] Hof Univ Appl Sci, Hof, Germany
关键词
Trusted execution environment; Hardware performance counter; Machine learning; Anomaly detection; Malware detection; Rust; PROTECTION;
D O I
10.1007/s10617-024-09283-1
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Large-scale attacks on IoT and edge computing devices pose a significant threat. As a prominent example, Mirai is an IoT botnet with 600,000 infected devices around the globe, capable of conducting effective and targeted DDoS attacks on (critical) infrastructure. Driven by the substantial impacts of attacks, manufacturers and system integrators propose Trusted Execution Environments (TEEs) that have gained significant importance recently. TEEs offer an execution environment to run small portions of code isolated from the rest of the system, even if the operating system is compromised. In this publication, we examine TEEs in the context of system monitoring and introduce the Trusted Monitor (TM), a novel anomaly detection system that runs within a TEE. The TM continuously profiles the system using hardware performance counters and utilizes an application-specific machine-learning model for anomaly detection. In our evaluation, we demonstrate that the TM accurately classifies 86% of 183 tested workloads, with an overhead of less than 2%. Notably, we show that a real-world kernel-level rootkit has observable effects on performance counters, allowing the TM to detect it. Major parts of the TM are implemented in the Rust programming language, eliminating common security-critical programming errors.
引用
收藏
页码:23 / 44
页数:22
相关论文
共 50 条
  • [1] Profiling with trust: system monitoring from trusted execution environments
    Christian Eichler
    Jonas Röckl
    Benedikt Jung
    Ralph Schlenk
    Tilo Müller
    Timo Hönig
    Design Automation for Embedded Systems, 2024, 28 : 23 - 44
  • [2] Time to Rethink: Trust Brokerage Using Trusted Execution Environments
    Koeberl, Patrick
    Phegade, Vinay
    Rajan, Anand
    Schneider, Thomas
    Schulz, Steffen
    Zhdanova, Maria
    TRUST AND TRUSTWORTHY COMPUTING, TRUST 2015, 2015, 9229 : 181 - 190
  • [3] Key Attestation from Trusted Execution Environments
    Kostiainen, Kari
    Dmitrienko, Alexandra
    Ekberg, Jan-Erik
    Sadeghi, Ahmad-Reza
    Asokan, N.
    TRUST AND TRUSTWORTHY COMPUTING, PROCEEDINGS, 2010, 6101 : 30 - +
  • [4] SeRoT: A Secure Runtime System on Trusted Execution Environments
    Liu, Jingbin
    Qin, Yu
    Feng, Dengguo
    2020 IEEE 19TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2020), 2020, : 30 - 37
  • [5] Graviton: Trusted Execution Environments on GPUs
    Volos, Stavros
    Vaswani, Kapil
    Bruno, Rodrigo
    PROCEEDINGS OF THE 13TH USENIX SYMPOSIUM ON OPERATING SYSTEMS DESIGN AND IMPLEMENTATION, 2018, : 681 - 696
  • [6] Building Open Trusted Execution Environments
    Kohlbrenner, David
    Shinde, Shweta
    Lee, Dayeol
    Asanovic, Krste
    Song, Dawn
    IEEE SECURITY & PRIVACY, 2020, 18 (05) : 47 - 56
  • [7] MultiTEE: Distributing Trusted Execution Environments
    Ott, Simon
    Orthen, Benjamin
    Weidinger, Alexander
    Horsch, Julian
    Nayani, Vijayanand
    Ekberg, Jan-Erik
    PROCEEDINGS OF THE 19TH ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, ACM ASIACCS 2024, 2024, : 1617 - 1629
  • [8] Fuzzing trusted execution environments with Rust
    Blinowski, Grzegorz
    Szaknis, Michal
    COMPUTERS & SECURITY, 2025, 150
  • [9] A survey on the (in)security of trusted execution environments
    Munoz, Antonio
    Rios, Ruben
    Roman, Rodrigo
    Lopez, Javier
    COMPUTERS & SECURITY, 2023, 129
  • [10] Towards Modular Trusted Execution Environments
    Weinhold, Carsten
    Asmussen, Nils
    Goehringer, Diana
    Roitzsch, Michael
    PROCEEDINGS OF THE 2023 6TH WORKSHOP ON SYSTEM SOFTWARE FOR TRUSTED EXECUTION, SYSTEX 2023, 2023, : 10 - 16