Detecting and Preventing ROP Attacks using Machine Learning on ARM

被引:1
|
作者
Welearegai, Gebrehiwet B. [1 ]
Hu, Chenpo
Hammer, Christian [1 ]
机构
[1] Univ Passau, Fac Informat & Math, Passau, Germany
来源
2023 IEEE 47TH ANNUAL COMPUTERS, SOFTWARE, AND APPLICATIONS CONFERENCE, COMPSAC | 2023年
关键词
ROP Detection; ARM; HPC; Machine Learning; Online Monitor;
D O I
10.1109/COMPSAC57700.2023.00092
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
As the ARM processor is receiving increased attention due to the fast growth of mobile technologies and the internet-of-things (IoT), it is simultaneously becoming the target of several control flow attacks such as return-oriented programming (ROP), which uses code present in the software system in order to exploit memory bugs. While some research can detect control flow attacks on architectures like x86, the ARM architecture has been neglected. In this paper, we investigate whether ROP attack detection and prevention based on hardware performance counters (HPC) and machine learning can be effectively transferred to the ARM architecture. Given the observation that ROP attacks exhibit different micro-architectural events compared to benign executions of a software, we evaluate whether and which HPCs, which track these hardware events, are indicative on ARM to detect control flow attacks. We collect data exploiting real-world vulnerable applications running on ARM-based Raspberry Pi machines. The collected data then serves as training data for different machine learning techniques. We also implement an online monitor consisting of a modified program loader, kernel module and a classifier, which labels a program's execution as benign or under attack, and stops its execution once the latter is detected. An evaluation of our approach provides detection accuracy of 92% for the offline training and 75% for the online monitoring, which demonstrates that variations in the HPCs are indicative of attacks on ARM architectures. The performance overhead of online monitoring evaluated on 8 real-world vulnerable applications exhibits a moderate 6.2% slowdown on average. The result of our evaluation indicates that the behavioral changes in micro-architectural events of the ARM platform can play a vital role in detecting memory attacks.
引用
收藏
页码:667 / 677
页数:11
相关论文
共 50 条
  • [21] A hybrid machine learning approach for detecting unprecedented DDoS attacks
    Najafimehr, Mohammad
    Zarifzadeh, Sajjad
    Mostafavi, Seyedakbar
    JOURNAL OF SUPERCOMPUTING, 2022, 78 (06) : 8106 - 8136
  • [22] A hybrid machine learning approach for detecting unprecedented DDoS attacks
    Mohammad Najafimehr
    Sajjad Zarifzadeh
    Seyedakbar Mostafavi
    The Journal of Supercomputing, 2022, 78 : 8106 - 8136
  • [23] Detecting Code Injection Attacks on Hybrid Apps with Machine Learning
    Xiao, Xi
    Yan, Ruibo
    Ye, Runguo
    Peng, Sancheng
    Li, Qing
    JOURNAL OF INTERNET TECHNOLOGY, 2017, 18 (04): : 843 - 854
  • [24] Detecting Cyber and Physical Attacks Against Mobile Robots Using Machine Learning: An Empirical Study
    Nyusti, Levente
    Chockalingam, Sabarathinam
    Bours, Patrick
    Bodal, Terje
    SECURE IT SYSTEMS, NORDSEC 2024, 2025, 15396 : 139 - 157
  • [25] Detecting False Data Injection Attacks in Peer to Peer Energy Trading Using Machine Learning
    Mohammadi, Sara
    Eliassen, Frank
    Zhang, Yan
    Jacobsen, Hans-Arno
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (05) : 3417 - 3431
  • [26] Detecting the Cyber Attacks on IoT-Based Network Devices Using Machine Learning Algorithms
    Calp, M. Hanefi
    Butuner, Resul
    JOURNAL OF POLYTECHNIC-POLITEKNIK DERGISI, 2024, 27 (05):
  • [27] A Machine Learning Approach for Detecting Spoofing Attacks in Wireless Sensor Networks
    de Lima Pinto, Eliel Marlon
    Lachowski, Rosana
    Pellenz, Marcelo E.
    Penna, Manoel C.
    Souza, Richard D.
    PROCEEDINGS 2018 IEEE 32ND INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (AINA), 2018, : 752 - 758
  • [28] On detecting and mitigating phishing attacks through featureless machine learning techniques
    Martins de Souza, Cristian H.
    Lemos, Marcilio O. O.
    Dantas Silva, Felipe S.
    Souza Alves, Robinson L.
    INTERNET TECHNOLOGY LETTERS, 2020, 3 (01)
  • [29] Machine Learning and Feature Engineering for Detecting Living off the Land Attacks
    Boros, Tiberiu
    Cotaie, Andrei
    Stan, Antrei
    Vikramjeet, Kumar
    Malik, Vivek
    Davidson, Joseph
    PROCEEDINGS OF THE 7TH INTERNATIONAL CONFERENCE ON INTERNET OF THINGS, BIG DATA AND SECURITY (IOTBDS), 2022, : 133 - 140
  • [30] Improved dropping attacks detecting system in 5g networks using machine learning and deep learning approaches
    Ala Mughaid
    Shadi AlZu’bi
    Asma Alnajjar
    Esraa AbuElsoud
    Subhieh El Salhi
    Bashar Igried
    Laith Abualigah
    Multimedia Tools and Applications, 2023, 82 : 13973 - 13995