Hardware-Based Malware Detection Using Low-Level Architectural Features

被引:64
作者
Ozsoy, Meltem [1 ]
Khasawneh, Khaled N. [2 ]
Donovick, Caleb [3 ]
Gorelik, Iakov [3 ]
Abu-Ghazaleh, Nael [2 ]
Ponomarev, Dmitry [3 ]
机构
[1] Intel Corp, Secur & Privacy Lab, Hillsboro, OR 97124 USA
[2] Univ Calif Riverside, CSE & ECE Dept, Riverside, CA 92521 USA
[3] SUNY Binghamton, CS Dept, Binghamton, NY 13902 USA
基金
美国国家科学基金会;
关键词
Malware detection; architecture; security; low-level features;
D O I
10.1109/TC.2016.2540634
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Security exploits and ensuant malware pose an increasing challenge to computing systems as the variety and complexity of attacks continue to increase. In response, software-based malware detection tools have grown in complexity, thus making it computationally difficult to use them to protect systems in real-time. Therefore, software detectors are applied selectively and at a low frequency, creating opportunities for malware to remain undetected. In this paper, we propose Malware-Aware Processors ( MAP)processors augmented with a hardware-based online malware detector to serve as the first line of defense to differentiate malware from legitimate programs. The output of this detector helps the system prioritize how to apply more expensive software-based solutions. The always-on nature of MAP detector helps protect against intermittently operating malware. We explore the use of different features for classification and study both logistic regression and neural networks. We show that the detectors can achieve excellent performance, with little hardware overhead. We integrate the MAP implementation with an open-source x86-compatible core, synthesizing the resulting design to run on an FPGA.
引用
收藏
页码:3332 / 3344
页数:13
相关论文
共 50 条
  • [21] Low-Level Flexible Architecture with Hybrid Reconfiguration for Evolvable Hardware
    Dobai, Roland
    Sekanina, Lukas
    ACM TRANSACTIONS ON RECONFIGURABLE TECHNOLOGY AND SYSTEMS, 2015, 8 (03)
  • [22] Certifying low-level programs with hardware interrupts and preemptive threads
    Feng, Xinyu
    Shao, Zhong
    Dong, Yuan
    Guo, Yu
    ACM SIGPLAN NOTICES, 2008, 43 (06) : 170 - 182
  • [23] Malware Detection with Convolutional Neural Network Using Hardware Events
    Guo, Wei
    Wang, Tenghai
    Wei, Jizeng
    COMPUTER ENGINEERING AND TECHNOLOGY, NCCET 2017, 2018, 600 : 104 - 115
  • [24] XMD: An Expansive Hardware-Telemetry-Based Mobile Malware Detector for Endpoint Detection
    Kumar, Harshit
    Chakraborty, Biswadeep
    Sharma, Sudarshan
    Mukhopadhyay, Saibal
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2023, 18 : 5906 - 5919
  • [25] Malware Detection Using Machine Learning Based on the Combination of Dynamic and Static Features
    Zhao, Jingling
    Zhang, Suoxing
    Liu, Bohan
    Cui, Baojiang
    2018 27TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND NETWORKS (ICCCN), 2018,
  • [26] Automatic Image Annotation Based on Low-Level Features and Classification of the Statistical Classes
    Bronevich, Andrey
    Melnichenko, Alexandra
    ROUGH SETS, FUZZY SETS, DATA MINING AND GRANULAR COMPUTING, RSFDGRC 2011, 2011, 6743 : 314 - 321
  • [27] Malware Variants Detection Using Behavior Destructive Features
    Chen, Yongle
    Jin, Bingchu
    Yu, Dan
    Chen, Junjie
    2018 IEEE SYMPOSIUM ON PRIVACY-AWARE COMPUTING (PAC), 2018, : 121 - 122
  • [28] A Comparison of Low-level Features for Visual Attribute Recognition
    Danaci, Emine Gul
    Ikizler Cinbis, Nazli
    2015 23RD SIGNAL PROCESSING AND COMMUNICATIONS APPLICATIONS CONFERENCE (SIU), 2015, : 2038 - 2041
  • [29] Low-level features for visual attribute recognition: An evaluation
    Danaci, Emine Gul
    Ikizler-Cinbis, Nazli
    PATTERN RECOGNITION LETTERS, 2016, 84 : 185 - 191
  • [30] Malware Detection with Neural Network Using Combined Features
    Zhou, Huan
    CYBER SECURITY, CNCERT 2018, 2019, 970 : 96 - 106