Quantifying and Improving the Efficiency of Hardware-based Mobile Malware Detectors

被引:0
|
作者
Kazdagli, Mikhail [1 ]
Reddi, Vijay Janapa [1 ]
Tiwari, Mohit [1 ]
机构
[1] Univ Texas Austin, Austin, TX 78712 USA
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Hardware-based malware detectors (HMDs) are a key emerging technology to build trustworthy systems, especially mobile platforms. Quantifying the efficacy of HMDs against malicious adversaries is thus an important problem. The challenge lies in that real-world malware adapts to defenses, evades being run in experimental settings, and hides behind benign applications. Thus, realizing the potential of HMDs as a small and battery-efficient line of defense requires a rigorous foundation for evaluating HMDs. We introduce Sherlock-a white-box methodology that quantifies an HMD's ability to detect malware and identify the reason why. Sherlock first deconstructs malware into atomic, orthogonal actions to synthesize a diverse malware suite. Sherlock then drives both malware and benign programs with real user-inputs, and compares their executions to determine an HMD's operating range, i.e., the smallest malware actions an HMD can detect. We show three case studies using Sherlock to not only quantify HMDs' operating ranges but design better detectors. First, using information about concrete malware actions, we build a discrete-wavelet transform based unsupervised HMD that outperforms prior work based on power transforms by 24.7% (AUC metric). Second, training a supervised HMD using Sherlock's diverse malware dataset yields 12.5% better HMDs than past approaches that train on ad-hoc subsets of malware. Finally, Sherlock shows why a malware instance is detectable. This yields a surprising new result-obfuscation techniques used by malware to evade static analyses makes them more detectable using HMDs.
引用
收藏
页数:13
相关论文
共 50 条
  • [11] Efficient Hardware Malware Detectors That are Resilient to Adversarial Evasion
    Islam, Md Shohidul
    Khasawneh, Khaled N.
    Abu-Ghazaleh, Nael
    Ponomarev, Dmitry
    Yu, Lei
    IEEE TRANSACTIONS ON COMPUTERS, 2022, 71 (11) : 2872 - 2887
  • [12] RHMD: Evasion-Resilient Hardware Malware Detectors
    Khasawneh, Khaled N.
    Abu-Ghazaleh, Nael
    Ponomarev, Dmitry
    Yu, Lei
    50TH ANNUAL IEEE/ACM INTERNATIONAL SYMPOSIUM ON MICROARCHITECTURE (MICRO), 2017, : 315 - 327
  • [13] A taxonomy of software-based and hardware-based approaches for energy efficiency management in the Hadoop
    Shabestari, Fatemeh
    Rahmani, Amir Masoud
    Navimipour, Nima Jafari
    Jabbehdari, Sam
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2019, 126 : 162 - 177
  • [14] Deep Neural Network and Transfer Learning for Accurate Hardware-Based Zero-Day Malware Detection
    He, Zhangying
    Rezaei, Amin
    Homayoun, Houman
    Sayadi, Hossein
    PROCEEDINGS OF THE 32ND GREAT LAKES SYMPOSIUM ON VLSI 2022, GLSVLSI 2022, 2022, : 27 - 32
  • [15] Ensemble Learning for Effective Run-Time Hardware-Based Malware Detection: A Comprehensive Analysis and Classification
    Sayadi, Hossein
    Patel, Nisarg
    Manoj, Sai P. D.
    Sasan, Avesta
    Rafatirad, Setareh
    Homayoun, Houman
    2018 55TH ACM/ESDA/IEEE DESIGN AUTOMATION CONFERENCE (DAC), 2018,
  • [16] Algorithms for hardware-based pattern recognition
    Lohweg, Volker
    Diederichs, Carsten
    Müller, Dietmar
    Eurasip Journal on Applied Signal Processing, 2004, 2004 (12): : 1912 - 1920
  • [17] Flexible Hardware-Based Stereo Matching
    Ambrosch, Kristian
    Kubinger, Wilfried
    Humenberger, Martin
    Steininger, Andreas
    EURASIP JOURNAL ON EMBEDDED SYSTEMS, 2008, (01)
  • [18] Hardware-based networking widens the pipes
    Ortiz, S
    COMPUTER, 1998, 31 (05) : 8 - 9
  • [19] Plugging hardware-based compression into a server
    不详
    EDN, 2007, 52 (24) : 30 - 30
  • [20] REFINEMENTS FOR HARDWARE-BASED LOGIC SIMULATION
    ROSE, C
    ELECTRONIC ENGINEERING, 1989, 61 (753): : 91 - &