Evaluation of implementability in a malware detection mechanism using processor information

被引:1
作者
Deguchi, Mutsuki [1 ]
Katoh, Masahiko [1 ]
Kobayashi, Ryotaro [2 ]
机构
[1] Univ Nagasaki, Nagasaki, Japan
[2] Kogakuin Univ, Tokyo, Japan
来源
2021 NINTH INTERNATIONAL SYMPOSIUM ON COMPUTING AND NETWORKING WORKSHOPS, CANDARW | 2021年
关键词
Machine learning; IoT; RISC-V; malware detection; hardware security;
D O I
10.1109/CANDARW53999.2021.00060
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Currently, software implementation is the mainstream approach for anti-malware measures. However, software-based anti-malware measures are difficult to implement in IoT devices with limited hardware resources. To solve this problem, a malware detection mechanism that can be realized with only hardware has been proposed. The hardware mechanism consists of three elements: an access-hit counter, dividers, and a classifier. The classifier is generated by random forest and uses processor information as feature values. To reduce the hardware scale, the HRTable was introduced instead of the dividers. We propose methods of reducing the scale of hardware resources and synchronizing CPU and the malware detection mechanism. This paper implements the proposed mechanism in hardware, simulates it while considering the delay caused by input/output to the HRTable, and evaluates the hardware scale of the proposed mechanism combined with RISC-V on FPGA.
引用
收藏
页码:313 / 319
页数:7
相关论文
共 15 条
[1]  
[Anonymous], 2018, Davidbiancolin, "ueb-bar/fpga-zynq
[2]  
[Anonymous], ZYNQ 7000 SOC DATA S
[3]  
[Anonymous], VIVADO DESIGN SUITE
[4]  
[Anonymous], 2018, Markoorbinuk, "risevarchive/risev-buildroot
[5]  
[Anonymous], 1 rocket chip
[6]  
Arm Ltd, Security IP: TrustZone
[7]  
Asanovic K., ROCKET CHIP GENERATO
[8]  
Deguchi M., 2020, Preliminary evaluation for FPGA implementation of malware detection mechanism using processor information
[9]  
Fraj MohtadiBen., 2017, In Depth: Parameter tuning for Gradient Boosting
[10]  
intel, Intel security features and technologies related to transient execution attacks