Quantifying and Improving the Efficiency of Hardware-based Mobile Malware Detectors

被引:0
|
作者
Kazdagli, Mikhail [1 ]
Reddi, Vijay Janapa [1 ]
Tiwari, Mohit [1 ]
机构
[1] Univ Texas Austin, Austin, TX 78712 USA
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Hardware-based malware detectors (HMDs) are a key emerging technology to build trustworthy systems, especially mobile platforms. Quantifying the efficacy of HMDs against malicious adversaries is thus an important problem. The challenge lies in that real-world malware adapts to defenses, evades being run in experimental settings, and hides behind benign applications. Thus, realizing the potential of HMDs as a small and battery-efficient line of defense requires a rigorous foundation for evaluating HMDs. We introduce Sherlock-a white-box methodology that quantifies an HMD's ability to detect malware and identify the reason why. Sherlock first deconstructs malware into atomic, orthogonal actions to synthesize a diverse malware suite. Sherlock then drives both malware and benign programs with real user-inputs, and compares their executions to determine an HMD's operating range, i.e., the smallest malware actions an HMD can detect. We show three case studies using Sherlock to not only quantify HMDs' operating ranges but design better detectors. First, using information about concrete malware actions, we build a discrete-wavelet transform based unsupervised HMD that outperforms prior work based on power transforms by 24.7% (AUC metric). Second, training a supervised HMD using Sherlock's diverse malware dataset yields 12.5% better HMDs than past approaches that train on ad-hoc subsets of malware. Finally, Sherlock shows why a malware instance is detectable. This yields a surprising new result-obfuscation techniques used by malware to evade static analyses makes them more detectable using HMDs.
引用
收藏
页数:13
相关论文
共 50 条
  • [31] EnsembleHMD: Accurate Hardware Malware Detectors with Specialized Ensemble Classifiers
    Khasawneh, Khaled N.
    Ozsoy, Meltem
    Donovick, Caleb
    Abu-Ghazaleh, Nael
    Ponomarev, Dmitry
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2020, 17 (03) : 620 - 633
  • [32] Real-Time Hardware-Based Malware and Micro-Architectural Attack Detection Utilizing CMOS Reservoir Computing
    Chandrasekaran, Sanjeev Tannirkulam
    Kuruvila, Abraham Peedikayil
    Basu, Kanad
    Sanyal, Arindam
    IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS II-EXPRESS BRIEFS, 2022, 69 (02) : 349 - 353
  • [33] Hardware-Based Performance Enhancement Guaranteed Caches
    Huangfu, Yijie
    Zhang, Wei
    2015 IEEE 18TH INTERNATIONAL SYMPOSIUM ON REAL-TIME DISTRIBUTED COMPUTING (ISORC), 2015, : 166 - 173
  • [34] A dynamically reconfigurable hardware-based cipher chip
    Mitsuyama, Y
    Andales, Z
    Onoye, T
    Shirakawa, I
    PROCEEDINGS OF THE ASP-DAC 2001: ASIA AND SOUTH PACIFIC DESIGN AUTOMATION CONFERENCE 2001, 2001, : 11 - 12
  • [35] A DSP hardware-based laboratory for signals and systems
    Huettel, Lisa G.
    2006 IEEE 12th Digital Signal Processing Workshop & 4th IEEE Signal Processing Education Workshop, Vols 1 and 2, 2006, : 456 - 459
  • [36] Teaching hardware-based DSP: Theory to practice
    Wright, CHG
    Welch, TB
    Etter, DM
    Morrow, MG
    2002 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING, VOLS I-IV, PROCEEDINGS, 2002, : 4148 - 4151
  • [37] Hardware-based volumetric knit-wear
    Daubert, K
    Seidel, HP
    COMPUTER GRAPHICS FORUM, 2002, 21 (03) : 575 - +
  • [38] OPERATIONAL CHARACTERISTICS OF A HARDWARE-BASED PATTERN MATCHER
    HASKIN, RL
    HOLLAAR, LA
    ACM TRANSACTIONS ON DATABASE SYSTEMS, 1983, 8 (01): : 15 - 40
  • [39] ARMlock: Hardware-based Fault Isolation for ARM
    Zhou, Yajin
    Wang, Xiaoguang
    Chen, Yue
    Wang, Zhi
    CCS'14: PROCEEDINGS OF THE 21ST ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2014, : 558 - 569
  • [40] Energy characterization of hardware-based data prefetching
    Guo, Y
    Chheda, S
    Koren, I
    Krishna, CM
    Moritz, CA
    IEEE INTERNATIONAL CONFERENCE ON COMPUTER DESIGN: VLSI IN COMPUTERS & PROCESSORS, PROCEEDINGS, 2004, : 518 - 523