Profiling with trust: system monitoring from trusted execution environments

被引:0
|
作者
Eichler, Christian [1 ]
Roeckl, Jonas [2 ]
Jung, Benedikt [3 ]
Schlenk, Ralph [3 ]
Mueller, Tilo [4 ]
Hoenig, Timo [1 ]
机构
[1] Ruhr Univ Bochum, Bochum, Germany
[2] FAU Erlangen Nurnberg, Erlangen, Germany
[3] Nokia Solut & Networks GmbH & Co KG, Nurnberg, Germany
[4] Hof Univ Appl Sci, Hof, Germany
关键词
Trusted execution environment; Hardware performance counter; Machine learning; Anomaly detection; Malware detection; Rust; PROTECTION;
D O I
10.1007/s10617-024-09283-1
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Large-scale attacks on IoT and edge computing devices pose a significant threat. As a prominent example, Mirai is an IoT botnet with 600,000 infected devices around the globe, capable of conducting effective and targeted DDoS attacks on (critical) infrastructure. Driven by the substantial impacts of attacks, manufacturers and system integrators propose Trusted Execution Environments (TEEs) that have gained significant importance recently. TEEs offer an execution environment to run small portions of code isolated from the rest of the system, even if the operating system is compromised. In this publication, we examine TEEs in the context of system monitoring and introduce the Trusted Monitor (TM), a novel anomaly detection system that runs within a TEE. The TM continuously profiles the system using hardware performance counters and utilizes an application-specific machine-learning model for anomaly detection. In our evaluation, we demonstrate that the TM accurately classifies 86% of 183 tested workloads, with an overhead of less than 2%. Notably, we show that a real-world kernel-level rootkit has observable effects on performance counters, allowing the TM to detect it. Major parts of the TM are implemented in the Rust programming language, eliminating common security-critical programming errors.
引用
收藏
页码:23 / 44
页数:22
相关论文
共 50 条
  • [31] A framework for application partitioning using trusted execution environments
    Atamli-Reineh, Ahmad
    Paverd, Andrew
    Petracca, Giuseppe
    Martin, Andrew
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2017, 29 (23):
  • [32] Fortress: Securing IoT Peripherals with Trusted Execution Environments
    Yuhala, Peterson
    Menetrey, James
    Felber, Pascal
    Pasin, Marcelo
    Schiavoni, Valerio
    39TH ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING, SAC 2024, 2024, : 243 - 250
  • [33] BOOMERANG: Exploiting the Semantic Gap in Trusted Execution Environments
    Machiry, Aravind
    Gustafson, Eric
    Spensky, Chad
    Salls, Chris
    Stephens, Nick
    Wang, Ruoyu
    Bianchi, Antonio
    Choe, Yung Ryn
    Kruegel, Christopher
    Vigna, Giovanni
    24TH ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2017), 2017,
  • [34] RT-Trust: Automated refactoring for different trusted execution environments under real-time constraints
    Liu, Yin
    An, Kijin
    Tilevich, Eli
    JOURNAL OF COMPUTER LANGUAGES, 2020, 56 (56)
  • [35] Actor Profiling in Virtual Execution Environments
    Rosa, Andrea
    Chen, Lydia Y.
    Binder, Walter
    ACM SIGPLAN NOTICES, 2017, 52 (03) : 36 - 46
  • [36] Trust and the Goldacre Review: why trusted research environments are not about trust
    Graham, Mackenzie
    Milne, Richard
    Fitzsimmons, Paige
    Sheehan, Mark
    JOURNAL OF MEDICAL ETHICS, 2022, : 670 - 673
  • [37] Secure sharing of industrial IoT data based on distributed trust management and trusted execution environments: a federated learning approach
    Zheng, Wei
    Cao, Yang
    Tan, Haining
    NEURAL COMPUTING & APPLICATIONS, 2023, 35 (29): : 21499 - 21509
  • [38] SafeKeeper: Protecting Web Passwords using Trusted Execution Environments
    Krawiecka, Klaudia
    Kurnikov, Arseny
    Paverd, Andrew
    Mannan, Mohammad
    Asokan, N.
    WEB CONFERENCE 2018: PROCEEDINGS OF THE WORLD WIDE WEB CONFERENCE (WWW2018), 2018, : 349 - 358
  • [39] SYSTEMATIZATION OF TRUSTED I/O SOLUTIONS FOR ISOLATED EXECUTION ENVIRONMENTS
    Stancu, Florin-Alexandru
    Mircea, Alexandru-Alin
    Rughiniș, Răzvan
    Chiroiu, Mihai
    UPB Scientific Bulletin, Series C: Electrical Engineering and Computer Science, 2022, 84 (02): : 3 - 14
  • [40] How trusted execution environments fuel research on microarchitectural attacks
    Schwarz, Michael
    Gruss, Daniel
    IEEE Security and Privacy, 2020, 18 (05): : 18 - 27