Profiling with trust: system monitoring from trusted execution environments

被引:0
|
作者
Eichler, Christian [1 ]
Roeckl, Jonas [2 ]
Jung, Benedikt [3 ]
Schlenk, Ralph [3 ]
Mueller, Tilo [4 ]
Hoenig, Timo [1 ]
机构
[1] Ruhr Univ Bochum, Bochum, Germany
[2] FAU Erlangen Nurnberg, Erlangen, Germany
[3] Nokia Solut & Networks GmbH & Co KG, Nurnberg, Germany
[4] Hof Univ Appl Sci, Hof, Germany
关键词
Trusted execution environment; Hardware performance counter; Machine learning; Anomaly detection; Malware detection; Rust; PROTECTION;
D O I
10.1007/s10617-024-09283-1
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Large-scale attacks on IoT and edge computing devices pose a significant threat. As a prominent example, Mirai is an IoT botnet with 600,000 infected devices around the globe, capable of conducting effective and targeted DDoS attacks on (critical) infrastructure. Driven by the substantial impacts of attacks, manufacturers and system integrators propose Trusted Execution Environments (TEEs) that have gained significant importance recently. TEEs offer an execution environment to run small portions of code isolated from the rest of the system, even if the operating system is compromised. In this publication, we examine TEEs in the context of system monitoring and introduce the Trusted Monitor (TM), a novel anomaly detection system that runs within a TEE. The TM continuously profiles the system using hardware performance counters and utilizes an application-specific machine-learning model for anomaly detection. In our evaluation, we demonstrate that the TM accurately classifies 86% of 183 tested workloads, with an overhead of less than 2%. Notably, we show that a real-world kernel-level rootkit has observable effects on performance counters, allowing the TM to detect it. Major parts of the TM are implemented in the Rust programming language, eliminating common security-critical programming errors.
引用
收藏
页码:23 / 44
页数:22
相关论文
共 50 条
  • [21] Cracking-Like Join for Trusted Execution Environments
    Maliszewski, Kajetan
    Quiane-Ruiz, Jorge-Arnulfo
    Markl, Volker
    PROCEEDINGS OF THE VLDB ENDOWMENT, 2023, 16 (09): : 2330 - 2343
  • [22] TEE-Perf: A Profiler for Trusted Execution Environments
    Bailleu, Maurice
    Dragoti, Donald
    Bhatotia, Pramod
    Fetzer, Christof
    2019 49TH ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS (DSN 2019), 2019, : 414 - 421
  • [23] Information Flow Control for Distributed Trusted Execution Environments
    Gollamudi, Anitha
    Chong, Stephen
    Arden, Owen
    2019 IEEE 32ND COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF 2019), 2019, : 304 - 318
  • [24] On Making Emerging Trusted Execution Environments Accessible to Developers
    Nyman, Thomas
    McGillion, Brian
    Asokan, N.
    TRUST AND TRUSTWORTHY COMPUTING, TRUST 2015, 2015, 9229 : 58 - 67
  • [25] Obscuro: A Bitcoin Mixer using Trusted Execution Environments
    Tran, Muoi
    Luu, Loi
    Kang, Min Suk
    Bentov, Iddo
    Saxena, Prateek
    34TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2018), 2018, : 692 - 701
  • [26] Keystone: An Open Framework for Architecting Trusted Execution Environments
    Lee, Dayeol
    Kohlbrenner, David
    Shinde, Shweta
    Asanovic, Krste
    Song, Dawn
    PROCEEDINGS OF THE FIFTEENTH EUROPEAN CONFERENCE ON COMPUTER SYSTEMS (EUROSYS'20), 2020,
  • [27] Trusted research environments are definitely about trust
    Affleck, Paul
    Westaway, Jenny
    Smith, Maurice
    Schrecker, Geoff
    JOURNAL OF MEDICAL ETHICS, 2023, 49 (09) : 656 - 657
  • [28] Remote Attestation Assurance Arguments for Trusted Execution Environments
    Usman, Ahmad B.
    Cole, Nigel
    Asplund, Mikael
    Boeira, Felipe
    Vestlund, Christian
    PROCEEDINGS OF THE 2023 ACM WORKSHOP ON SECURE AND TRUSTWORTHY CYBER-PHYSICAL SYSTEMS, SAT-CPS 2023, 2023, : 33 - 42
  • [29] The Untapped Potential of Trusted Execution Environments on Mobile Devices
    Ekberg, Jan-Erik
    Kostiainen, Kari
    Asokan, N.
    IEEE SECURITY & PRIVACY, 2014, 12 (04) : 29 - 37
  • [30] DELEGATEE: Brokered Delegation Using Trusted Execution Environments
    Matetic, Sinisa
    Schneider, Moritz
    Miller, Andrew
    Juels, Ari
    Capkun, Srdjan
    PROCEEDINGS OF THE 27TH USENIX SECURITY SYMPOSIUM, 2018, : 1387 - 1403