Hardware-Based Malware Detection Using Low-Level Architectural Features

被引:64
作者
Ozsoy, Meltem [1 ]
Khasawneh, Khaled N. [2 ]
Donovick, Caleb [3 ]
Gorelik, Iakov [3 ]
Abu-Ghazaleh, Nael [2 ]
Ponomarev, Dmitry [3 ]
机构
[1] Intel Corp, Secur & Privacy Lab, Hillsboro, OR 97124 USA
[2] Univ Calif Riverside, CSE & ECE Dept, Riverside, CA 92521 USA
[3] SUNY Binghamton, CS Dept, Binghamton, NY 13902 USA
基金
美国国家科学基金会;
关键词
Malware detection; architecture; security; low-level features;
D O I
10.1109/TC.2016.2540634
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Security exploits and ensuant malware pose an increasing challenge to computing systems as the variety and complexity of attacks continue to increase. In response, software-based malware detection tools have grown in complexity, thus making it computationally difficult to use them to protect systems in real-time. Therefore, software detectors are applied selectively and at a low frequency, creating opportunities for malware to remain undetected. In this paper, we propose Malware-Aware Processors ( MAP)processors augmented with a hardware-based online malware detector to serve as the first line of defense to differentiate malware from legitimate programs. The output of this detector helps the system prioritize how to apply more expensive software-based solutions. The always-on nature of MAP detector helps protect against intermittently operating malware. We explore the use of different features for classification and study both logistic regression and neural networks. We show that the detectors can achieve excellent performance, with little hardware overhead. We integrate the MAP implementation with an open-source x86-compatible core, synthesizing the resulting design to run on an FPGA.
引用
收藏
页码:3332 / 3344
页数:13
相关论文
共 50 条
  • [41] Infrared and visible image fusion scheme based on NSCT and low-level visual features
    Li, Huafeng
    Qiu, Hongmei
    Yu, Zhengtao
    Zhang, Yafei
    INFRARED PHYSICS & TECHNOLOGY, 2016, 76 : 174 - 184
  • [42] Malware-Detection Model Using Learning-Based Discovery of Static Features
    Hsiao, Shou-Ching
    Kao, Da-Yu
    Tso, Raylin
    2018 IEEE CONFERENCE ON APPLICATION, INFORMATION AND NETWORK SECURITY (AINS 2018), 2018, : 54 - 59
  • [43] Using Capsule Networks for Android Malware Detection Through Orientation-Based Features
    Khan, Sohail
    Nauman, Mohammad
    Alsaif, Suleiman Ali
    Syed, Toqeer Ali
    Eleraky, Hassan Ahmad
    CMC-COMPUTERS MATERIALS & CONTINUA, 2022, 70 (03): : 5345 - 5362
  • [44] Machine learning-based malware detection on Android devices using behavioral features
    Urmila, T. S.
    MATERIALS TODAY-PROCEEDINGS, 2022, 62 : 4659 - 4664
  • [45] Malware Detection using DNS Records and Domain Name Features
    Al Messabi, Khulood
    Aldwairi, Monther
    Al Yousif, Ayesha
    Thoban, Anoud
    Belqasmi, Fatna
    ICFNDS'18: PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON FUTURE NETWORKS AND DISTRIBUTED SYSTEMS, 2018,
  • [46] Malware Detection Using Gist Features and Deep Neural Network
    Krithika, V
    Vijaya, M. S.
    2020 6TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING AND COMMUNICATION SYSTEMS (ICACCS), 2020, : 800 - 805
  • [47] Hardware-Assisted Malware Detection and Localization Using Explainable Machine Learning
    Pan, Zhixin
    Sheldon, Jennifer
    Mishra, Prabhat
    IEEE TRANSACTIONS ON COMPUTERS, 2022, 71 (12) : 3308 - 3321
  • [48] Malware Detection Based on Term Frequency Analysis of GPRs Features
    Li, Fang
    Zhu, Ziyuan
    Yan, Chao
    Chen, Bowen
    Meng, Dan
    2020 IEEE 19TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2020), 2020, : 194 - 201
  • [49] MobileNet-Based IoT Malware Detection with Opcode Features
    Mai C.
    Liao R.
    Ren J.
    Gong Y.
    Zhang K.
    Zhang C.
    Journal of Communications and Information Networks, 2023, 8 (03) : 221 - 230
  • [50] A survey of IoT malware and detection methods based on static features
    Quoc-Dung Ngo
    Huy-Trung Nguyen
    Van-Hoang Le
    Doan-Hieu Nguyen
    ICT EXPRESS, 2020, 6 (04): : 280 - 286