Quantifying and Improving the Efficiency of Hardware-based Mobile Malware Detectors

被引:0
|
作者
Kazdagli, Mikhail [1 ]
Reddi, Vijay Janapa [1 ]
Tiwari, Mohit [1 ]
机构
[1] Univ Texas Austin, Austin, TX 78712 USA
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Hardware-based malware detectors (HMDs) are a key emerging technology to build trustworthy systems, especially mobile platforms. Quantifying the efficacy of HMDs against malicious adversaries is thus an important problem. The challenge lies in that real-world malware adapts to defenses, evades being run in experimental settings, and hides behind benign applications. Thus, realizing the potential of HMDs as a small and battery-efficient line of defense requires a rigorous foundation for evaluating HMDs. We introduce Sherlock-a white-box methodology that quantifies an HMD's ability to detect malware and identify the reason why. Sherlock first deconstructs malware into atomic, orthogonal actions to synthesize a diverse malware suite. Sherlock then drives both malware and benign programs with real user-inputs, and compares their executions to determine an HMD's operating range, i.e., the smallest malware actions an HMD can detect. We show three case studies using Sherlock to not only quantify HMDs' operating ranges but design better detectors. First, using information about concrete malware actions, we build a discrete-wavelet transform based unsupervised HMD that outperforms prior work based on power transforms by 24.7% (AUC metric). Second, training a supervised HMD using Sherlock's diverse malware dataset yields 12.5% better HMDs than past approaches that train on ad-hoc subsets of malware. Finally, Sherlock shows why a malware instance is detectable. This yields a surprising new result-obfuscation techniques used by malware to evade static analyses makes them more detectable using HMDs.
引用
收藏
页数:13
相关论文
共 50 条
  • [1] Analyzing the Efficiency of Machine Learning Classifiers in Hardware-based Malware Detectors
    Kuruvila, Abraham Peedikayil
    Kundu, Shamik
    Basu, Kanad
    2020 IEEE COMPUTER SOCIETY ANNUAL SYMPOSIUM ON VLSI (ISVLSI 2020), 2020, : 452 - 457
  • [2] Defending Hardware-Based Malware Detectors Against Adversarial Attacks
    Kuruvila, Abraham Peedikayil
    Kundu, Shamik
    Basu, Kanad
    IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2021, 40 (09) : 1727 - 1739
  • [3] A Survey on Hardware-Based Malware Detection Approaches
    Chenet, Cristiano Pegoraro
    Savino, Alessandro
    Di Carlo, Stefano
    IEEE ACCESS, 2024, 12 : 54115 - 54128
  • [4] Analyzing Hardware Based Malware Detectors
    Patel, Nisarg
    Sasan, Avesta
    Homayoun, Houman
    PROCEEDINGS OF THE 2017 54TH ACM/EDAC/IEEE DESIGN AUTOMATION CONFERENCE (DAC), 2017,
  • [5] Hardware-based Workload Forensics and Malware Detection in Microprocessors
    Zhou, Liwei
    Makris, Yiorgos
    2016 17TH INTERNATIONAL WORKSHOP ON MICROPROCESSOR AND SOC TEST AND VERIFICATION (MTV), 2016, : 45 - 50
  • [6] Hardware-Based Malware Detection Using Low-Level Architectural Features
    Ozsoy, Meltem
    Khasawneh, Khaled N.
    Donovick, Caleb
    Gorelik, Iakov
    Abu-Ghazaleh, Nael
    Ponomarev, Dmitry
    IEEE TRANSACTIONS ON COMPUTERS, 2016, 65 (11) : 3332 - 3344
  • [7] Improving NIDS Performance Through Hardware-based Connection Filtering
    Garg, Vikas
    Yegneswaran, Vinod
    Barford, Paul
    2006 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-12, 2006, : 2183 - 2188
  • [8] Evaluating Energy-Efficiency of Hardware-based Security Mechanisms
    Haas, Christian
    Munz, Stephan
    Wilke, Joachim
    Hergenroeder, Anton
    2013 IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS (PERCOM WORKSHOPS), 2013, : 560 - 565
  • [9] Virtualization and hardware-based security
    Perez, Ronald
    Sailer, Reiner
    van Doorn, Leendert
    IEEE SECURITY & PRIVACY, 2008, 6 (05) : 24 - 31
  • [10] Hardware-based Cyber Threats
    Alves, Thiago
    Morris, Thomas
    ICISSP: PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2018, : 259 - 266