Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3061639.3062202acmconferencesArticle/Chapter ViewAbstractPublication PagesdacConference Proceedingsconference-collections
research-article

Analyzing Hardware Based Malware Detectors

Published: 18 June 2017 Publication History

Abstract

Detection of malicious software at the hardware level is emerging as an effective solution to increasing security threats. Hardware based detectors rely on Machine Learning(ML) classifiers to detect malware-like execution pattern based on Hardware Performance Counters(HPC) information at runtime. The effectiveness of these learning methods mainly relies on the information provided by expensive-to-implement limited number of HPC. This paper is the first attempt to thoroughly analyze various robust machine learning methods to classify benign and malware applications. Given the limited availability of HPC the analysis results help guiding architectural decision on what hardware performance counters are needed most to effectively improve ML classification accuracy. For software implementation we fully implemented these classifier at OS Kernel to understand various software overheads. The software implementation of these classifiers are found to be relatively slow with the execution time in the range of milliseconds, order of magnitude higher than the latency needed to capture malware at runtime. This is calling for hardware accelerated implementation of these algorithms. For hardware implementation, we have synthesized the studied classifier models on FPGA to compare various design parameters including logic area, power, and latency. The results show that while complex ML classifier such as MultiLayerPerceptron and logistics are achieving close to 90% accuracy, after taking into consideration their implementation overheads, they perform worst in terms of PDP, accuracy/area and latency compared to simpler but slightly less accurate rule based and tree based classifiers. Our results further show OneR to be the most cost-effective classifier with more than 80% accuracy and fast execution time of less than 10ns, achieving highest accuracy per logic area, while mainly relying on only a single branch-instruction HPC information.

References

[1]
Virustotal intelligence service. http://www.virustotal.com/intelligence/. Accessed: November 2016.
[2]
Bahador et al. Hpcmalhunter: Behavioral malware detection using hardware performance counters and singular value decomposition. In (ICCKE), 2014. IEEE.
[3]
Bircher et al. Complete system power estimation: A trickle-down approach based on performance events. In 2007 IEEE International Symposium on Performance Analysis of Systems & Software, 2007.
[4]
Bitzes et al. The overhead of profiling using pmu hardware counters. CERN openlab report, 2014.
[5]
Demme et al. On the feasibility of online malware detection with performance counters. In ACM SIGARCH Computer Architecture News, volume 41, 2013.
[6]
A. Garcia-Serrano. Anomaly detection for malware identification using hardware performance counters. arXiv preprint arXiv:1508.07482, 2015.
[7]
Guthaus et al. Mibench: A free, commercially representative embedded benchmark suite. In 2001 IEEE International Workshop on Workload Characterization.
[8]
Hall et al. The weka data mining software: an update. ACM SIGKDD explorations newsletter, 2009.
[9]
M. Helsley. Lxc: Linux container tools. IBM devloper-Works Technical Library, 2009.
[10]
Intel. Intel 64 and ia-32 architectures software developer's manual, volume 3b: System programming guide. Part, 2:18--65, 2016.
[11]
Jacob et al. Behavioral detection of malware: from a survey towards an established taxonomy. Journal in computer Virology, 4(3):251--266, 2008.
[12]
Khasawneh et al. Ensemble learning for low-level hardware-supported malware detection. In International Workshop on Recent Advances in Intrusion Detection, pages 3--25. Springer, 2015.
[13]
M. Malik and H. Homayoun. Big data on low power cores: Are low power embedded processors a good fit for the big data workloads? In 2015 33rd IEEE International Conference on Computer Design (ICCD).
[14]
M. Malik, S. Rafatirah, A. Sasan, and H. Homayoun. System and architecture level characterization of big data applications on big and little core server architectures. In 2015 IEEE International Conference on Big Data.
[15]
M. Malik, A. Sasan, R. Joshi, S. Rafatirah, and H. Homayoun. Characterizing hadoop applications on microservers for performance and energy efficiency optimizations. In Performance Analysis of Systems and Software (ISPASS), 2016 IEEE International Symposium on, pages 153--154. IEEE.
[16]
McAfee Labs. Infographic: Mcafee labs threats report. March 2016.
[17]
Ozsoy et al. Malware-aware processors: A framework for efficient online malware detection. In 2015 IEEE 21st International Symposium on High Performance Computer Architecture (HPCA).
[18]
Spinellis et al. Reliable identification of bounded-length viruses is np-complete. IEEE Transactions on Information Theory, 49(1):280--284, 2003.
[19]
Tang et al. Unsupervised anomaly-based malware detection using hardware features. In International Workshop on Recent Advances in Intrusion Detection, pages 109--129. Springer, 2014.
[20]
Wang et al. Confirm: Detecting firmware modifications in embedded systems using hardware performance counters. In Computer-Aided Design (ICCAD), 2015 IEEE/ACM International Conference on.
[21]
T. Winograd, H. Salmani, H. Mahmoodi, K. Gaj, and H. Homayoun. Hybrid stt-cmos designs for reverse-engineering prevention. In Proceedings of the 53rd Annual Design Automation Conference. ACM, 2016.
[22]
T. Winograd, H. Salmani, H. Mahmoodi, and H. Homayoun. Preventing design reverse engineering with reconfigurable spin transfer torque lut gates. In Quality Electronic Design (ISQED), 2016 17th International Symposium on, pages 242--247. IEEE.

Cited By

View all
  • (2024)Lightweight Hardware-Based Cache Side-Channel Attack Detection for Edge Devices (Edge-CaSCADe)ACM Transactions on Embedded Computing Systems10.1145/366367323:4(1-27)Online publication date: 11-May-2024
  • (2024)Comprehensive Analysis of Consistency and Robustness of Machine Learning Models in Malware DetectionProceedings of the Great Lakes Symposium on VLSI 202410.1145/3649476.3658725(477-482)Online publication date: 12-Jun-2024
  • (2024)Processing-in-Memory Architecture with Precision-Scaling for Malware Detection2024 37th International Conference on VLSI Design and 2024 23rd International Conference on Embedded Systems (VLSID)10.1109/VLSID60093.2024.00094(529-534)Online publication date: 6-Jan-2024
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
DAC '17: Proceedings of the 54th Annual Design Automation Conference 2017
June 2017
533 pages
ISBN:9781450349277
DOI:10.1145/3061639
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

In-Cooperation

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 18 June 2017

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Conference

DAC '17
Sponsor:

Acceptance Rates

Overall Acceptance Rate 1,770 of 5,499 submissions, 32%

Upcoming Conference

DAC '25
62nd ACM/IEEE Design Automation Conference
June 22 - 26, 2025
San Francisco , CA , USA

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)72
  • Downloads (Last 6 weeks)16
Reflects downloads up to 25 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Lightweight Hardware-Based Cache Side-Channel Attack Detection for Edge Devices (Edge-CaSCADe)ACM Transactions on Embedded Computing Systems10.1145/366367323:4(1-27)Online publication date: 11-May-2024
  • (2024)Comprehensive Analysis of Consistency and Robustness of Machine Learning Models in Malware DetectionProceedings of the Great Lakes Symposium on VLSI 202410.1145/3649476.3658725(477-482)Online publication date: 12-Jun-2024
  • (2024)Processing-in-Memory Architecture with Precision-Scaling for Malware Detection2024 37th International Conference on VLSI Design and 2024 23rd International Conference on Embedded Systems (VLSID)10.1109/VLSID60093.2024.00094(529-534)Online publication date: 6-Jan-2024
  • (2024)CMD: Co-analyzed IoT Malware Detection and Forensics via Network and Hardware DomainsIEEE Transactions on Mobile Computing10.1109/TMC.2023.3311012(1-15)Online publication date: 2024
  • (2024)Cyber Resilience for the Internet of Things: Implementations With Resilience Engines and Attack ClassificationsIEEE Transactions on Emerging Topics in Computing10.1109/TETC.2022.323169212:2(583-600)Online publication date: Apr-2024
  • (2024)TPE-Det: A Tamper-Proof External Detector via Hardware Traces Analysis Against IoT MalwareIEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems10.1109/TCAD.2024.344471243:11(3455-3466)Online publication date: Nov-2024
  • (2024)Intelligent Malware Detection based on Hardware Performance Counters: A Comprehensive Survey2024 25th International Symposium on Quality Electronic Design (ISQED)10.1109/ISQED60706.2024.10528369(1-10)Online publication date: 3-Apr-2024
  • (2024)Resource- and Workload-aware Malware Detection through Distributed Computing in IoT Networks2024 29th Asia and South Pacific Design Automation Conference (ASP-DAC)10.1109/ASP-DAC58780.2024.10473814(368-373)Online publication date: 22-Jan-2024
  • (2024)Ransomware Classification Using Hardware Performance Counters on a Non-Virtualized SystemIEEE Access10.1109/ACCESS.2024.339549112(63865-63884)Online publication date: 2024
  • (2024)A Survey on Hardware-Based Malware Detection ApproachesIEEE Access10.1109/ACCESS.2024.338871612(54115-54128)Online publication date: 2024
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media