Profiling with trust: system monitoring from trusted execution environments

被引:0
|
作者
Eichler, Christian [1 ]
Roeckl, Jonas [2 ]
Jung, Benedikt [3 ]
Schlenk, Ralph [3 ]
Mueller, Tilo [4 ]
Hoenig, Timo [1 ]
机构
[1] Ruhr Univ Bochum, Bochum, Germany
[2] FAU Erlangen Nurnberg, Erlangen, Germany
[3] Nokia Solut & Networks GmbH & Co KG, Nurnberg, Germany
[4] Hof Univ Appl Sci, Hof, Germany
关键词
Trusted execution environment; Hardware performance counter; Machine learning; Anomaly detection; Malware detection; Rust; PROTECTION;
D O I
10.1007/s10617-024-09283-1
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Large-scale attacks on IoT and edge computing devices pose a significant threat. As a prominent example, Mirai is an IoT botnet with 600,000 infected devices around the globe, capable of conducting effective and targeted DDoS attacks on (critical) infrastructure. Driven by the substantial impacts of attacks, manufacturers and system integrators propose Trusted Execution Environments (TEEs) that have gained significant importance recently. TEEs offer an execution environment to run small portions of code isolated from the rest of the system, even if the operating system is compromised. In this publication, we examine TEEs in the context of system monitoring and introduce the Trusted Monitor (TM), a novel anomaly detection system that runs within a TEE. The TM continuously profiles the system using hardware performance counters and utilizes an application-specific machine-learning model for anomaly detection. In our evaluation, we demonstrate that the TM accurately classifies 86% of 183 tested workloads, with an overhead of less than 2%. Notably, we show that a real-world kernel-level rootkit has observable effects on performance counters, allowing the TM to detect it. Major parts of the TM are implemented in the Rust programming language, eliminating common security-critical programming errors.
引用
收藏
页码:23 / 44
页数:22
相关论文
共 50 条
  • [41] Universal Trusted Execution Environments for Securing SDN/NFV Operations
    Lefebvre, Vincent
    Santinelli, Gianni
    Mueller, Tilo
    Goetzfried, Johannes
    13TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2018), 2019,
  • [42] Trusted Execution Environments for Telecoms: Strengths, Weaknesses, Opportunities, and Threats
    Lacoste, Marc
    Lefebvre, Vincent
    IEEE SECURITY & PRIVACY, 2023, 21 (03) : 37 - 46
  • [43] Secure sharing of industrial IoT data based on distributed trust management and trusted execution environments: a federated learning approach
    Wei Zheng
    Yang Cao
    Haining Tan
    Neural Computing and Applications, 2023, 35 : 21499 - 21509
  • [44] A Secure IIoT Gateway Architecture based on Trusted Execution Environments
    Froehlich, Antonio Augusto
    Horstmann, Leonardo Passig
    Hoffmann, Jose Luis Conradi
    JOURNAL OF NETWORK AND SYSTEMS MANAGEMENT, 2023, 31 (02)
  • [45] Secure and Efficient Mobile DNN Using Trusted Execution Environments
    Hu, Bin
    Wang, Yan
    Cheng, Jerry
    Zhao, Tianming
    Xie, Yucheng
    Guo, Xiaonan
    Chen, Yingying
    PROCEEDINGS OF THE 2023 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, ASIA CCS 2023, 2023, : 274 - 285
  • [46] TrustHealth: Enhancing eHealth Security with Blockchain and Trusted Execution Environments
    Li, Jun
    Luo, Xinman
    Lei, Hong
    ELECTRONICS, 2024, 13 (12)
  • [47] SoK: Understanding Designs Choices and Pitfalls of Trusted Execution Environments
    Li, Mengyuan
    Yang, Yuheng
    Chen, Guoxing
    Yan, Mengjia
    Zhang, Yinqian
    PROCEEDINGS OF THE 19TH ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, ACM ASIACCS 2024, 2024, : 1600 - 1616
  • [48] Formal Verification of Virtualization-Based Trusted Execution Environments
    Witharana, Hasini
    Weerasena, Hansika
    Mishra, Prabhat
    IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2024, 43 (11) : 4262 - 4273
  • [49] How Trusted Execution Environments Fuel Research on Microarchitectural Attacks
    Schwarz, Michael
    Gruss, Daniel
    IEEE SECURITY & PRIVACY, 2020, 18 (05) : 18 - 27
  • [50] Secret Sharing in Pub/Sub Using Trusted Execution Environments
    Munster, Javier
    Jacobsen, Hans-Arno
    DEBS'18: PROCEEDINGS OF THE 12TH ACM INTERNATIONAL CONFERENCE ON DISTRIBUTED AND EVENT-BASED SYSTEMS, 2018, : 28 - 39