Quantifying and Improving the Efficiency of Hardware-based Mobile Malware Detectors

被引:0
|
作者
Kazdagli, Mikhail [1 ]
Reddi, Vijay Janapa [1 ]
Tiwari, Mohit [1 ]
机构
[1] Univ Texas Austin, Austin, TX 78712 USA
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Hardware-based malware detectors (HMDs) are a key emerging technology to build trustworthy systems, especially mobile platforms. Quantifying the efficacy of HMDs against malicious adversaries is thus an important problem. The challenge lies in that real-world malware adapts to defenses, evades being run in experimental settings, and hides behind benign applications. Thus, realizing the potential of HMDs as a small and battery-efficient line of defense requires a rigorous foundation for evaluating HMDs. We introduce Sherlock-a white-box methodology that quantifies an HMD's ability to detect malware and identify the reason why. Sherlock first deconstructs malware into atomic, orthogonal actions to synthesize a diverse malware suite. Sherlock then drives both malware and benign programs with real user-inputs, and compares their executions to determine an HMD's operating range, i.e., the smallest malware actions an HMD can detect. We show three case studies using Sherlock to not only quantify HMDs' operating ranges but design better detectors. First, using information about concrete malware actions, we build a discrete-wavelet transform based unsupervised HMD that outperforms prior work based on power transforms by 24.7% (AUC metric). Second, training a supervised HMD using Sherlock's diverse malware dataset yields 12.5% better HMDs than past approaches that train on ad-hoc subsets of malware. Finally, Sherlock shows why a malware instance is detectable. This yields a surprising new result-obfuscation techniques used by malware to evade static analyses makes them more detectable using HMDs.
引用
收藏
页数:13
相关论文
共 50 条
  • [41] Privacy Enhancements for Hardware-Based Security Modules
    Pasupathinathan, Vijayakrishnan
    Pieprzyk, Josef
    Wang, Huaxiong
    E-BUSINESS AND TELECOMMUNICATIONS, 2011, 130 : 224 - +
  • [42] A simplified scheme for hardware-based pattern recognition
    Henke, T
    Ginzel, T
    Lohweg, V
    2005 International Conference on Image Processing (ICIP), Vols 1-5, 2005, : 301 - 304
  • [43] A hardware-based predictive motion estimation algorithm
    Hamalainen, S
    Koskinen, L
    Halonen, K
    2005 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS), VOLS 1-6, CONFERENCE PROCEEDINGS, 2005, : 6114 - 6117
  • [44] Hardware-Based Fast Hybrid Morphological Reconstruction
    Anacona-Mosquera, Oscar
    dos Santos, Carlos Eduardo
    Cabral, Felipe R. G.
    Sampaio, Renato C.
    Teodoro, George
    Jacobi, Ricardo Pezzuol
    Llanos, Carlos Humberto
    IEEE DESIGN & TEST, 2020, 37 (03) : 30 - 39
  • [45] XMD: An Expansive Hardware-Telemetry-Based Mobile Malware Detector for Endpoint Detection
    Kumar, Harshit
    Chakraborty, Biswadeep
    Sharma, Sudarshan
    Mukhopadhyay, Saibal
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2023, 18 : 5906 - 5919
  • [46] Hardware-based TCP processor for Gigabit Ethernet
    Uchida, Tomohisa
    IEEE TRANSACTIONS ON NUCLEAR SCIENCE, 2008, 55 (03) : 1631 - 1637
  • [47] An improved method for hardware-based complex demodulation
    Skwarek, V
    Hans, V
    MEASUREMENT, 2001, 29 (02) : 87 - 93
  • [48] Hardware-Based WebAssembly Accelerator for Embedded System
    Kim, Jinyeol
    Kim, Raehyeong
    Oh, Jongwon
    Lee, Seung Eun
    ELECTRONICS, 2024, 13 (20)
  • [49] A Gaussian noise generator for hardware-based simulations
    Lee, DU
    Luk, W
    Villasenor, JD
    Cheung, PYK
    IEEE TRANSACTIONS ON COMPUTERS, 2004, 53 (12) : 1523 - 1534
  • [50] Hardware-based TCP processor for Gigabit Ethernet
    Uchida, Tomohisa
    2007 IEEE NUCLEAR SCIENCE SYMPOSIUM CONFERENCE RECORD, VOLS 1-11, 2007, : 309 - 315