Hardware-based Workload Forensics and Malware Detection in Microprocessors

被引:3
|
作者
Zhou, Liwei [1 ]
Makris, Yiorgos [1 ]
机构
[1] Univ Texas Dallas, Dept Elect Engn, Richardson, TX 75080 USA
来源
2016 17TH INTERNATIONAL WORKSHOP ON MICROPROCESSOR AND SOC TEST AND VERIFICATION (MTV) | 2016年
关键词
D O I
10.1109/MTV.2016.20
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
We investigate the possibility of performing workload forensics and/or malware detection in microprocessors through exclusively hardware-based methodologies. Specifically, we first introduce a general architecture which a hardware-based forensics or malware detection method would need to follow, as well as the various processor-level information which could potentially be harnessed to ensure system security and/or integrity. In contrast to traditional forensics and/or malware detection methods implemented at the operating system (OS) and/or the hypervisor level, whose data logging and monitoring systems are vulnerable to spoofing attacks at the same level, moving implementation to hardware ensures immunity to such attacks. This work focuses on two recent incarnations of this general concept, illustrating the effectiveness of hardware-based forensics and/or malware detection. Several other recent methods related to this topic are also discussed. Experimental results corroborate that even a low-cost hardware implementation can facilitate highly successful forensics analysis and/or malware detection, while taking advantage of its innate immunity to software-based attacks.
引用
收藏
页码:45 / 50
页数:6
相关论文
共 50 条
  • [21] On a graphics hardware-based vortex detection and visualization system
    Stegmaier, S
    Ertl, T
    JOURNAL OF VISUALIZATION, 2005, 8 (02) : 153 - 160
  • [22] An efficient hardware-based design for network intrusion detection
    Department of Electronics Engineering, Ching Yun University, Chungli 320, Taiwan
    WSEAS Trans. Electron., 2007, 3 (49-55):
  • [23] A graphics hardware-based vortex detection and visualization system
    Stegmaier, S
    Ertl, T
    IEEE VISUALIZATION 2004, PROCEEEDINGS, 2004, : 195 - 202
  • [24] A Malware Detection Approach Based on Deep Learning and Memory Forensics
    Zhang, Shuhui
    Hu, Changdong
    Wang, Lianhai
    Mihaljevic, Miodrag J.
    Xu, Shujiang
    Lan, Tian
    SYMMETRY-BASEL, 2023, 15 (03):
  • [25] CMD: Co-Analyzed IoT Malware Detection and Forensics via Network and Hardware Domains
    Zhao, Ziming
    Li, Zhaoxuan
    Yu, Jiongchi
    Zhang, Fan
    Xie, Xiaofei
    Xu, Haitao
    Chen, Binbin
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2024, 23 (05) : 5589 - 5603
  • [26] A Hardware-Based Orientation Detection System Using Dendritic Computation
    Nomura, Masahiro
    Chen, Tianqi
    Tang, Cheng
    Todo, Yuki
    Sun, Rong
    Li, Bin
    Tang, Zheng
    ELECTRONICS, 2024, 13 (07)
  • [27] Hardware-Based Sequential Consistency Violation Detection Made Simpler
    Islam, Mohammad Majharul
    Akram, Riad
    Muzahid, Abdullah
    ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, ICA3PP 2016, 2016, 10048 : 18 - 37
  • [28] UNITE: Uniform hardware-based network intrusion deTection engine
    Yusuf, S.
    Luk, W.
    Szeto, M. K. N.
    Osborne, W.
    RECONFIGURABLE COMPUTING: ARCHITECTURES AND APPLICATIONS, 2006, 3985 : 389 - 400
  • [29] Hardware-Based Detection of Spectre Attacks: A Machine Learning Approach
    Zhang, Yunjie
    Makris, Yiorgos
    PROCEEDINGS OF THE 2020 ASIAN HARDWARE ORIENTED SECURITY AND TRUST SYMPOSIUM (ASIANHOST), 2020,
  • [30] Hardware-based Probabilistic Threat Detection and Estimation for Embedded Systems
    Carreon, Nadir A.
    Lu, Sixing
    Lysecky, Roman
    2018 IEEE 36TH INTERNATIONAL CONFERENCE ON COMPUTER DESIGN (ICCD), 2018, : 522 - 529