EDDIE: EM-Based Detection of Deviations in Program Execution

被引:98
作者
Nazari, Alireza [1 ]
Sehatbakhsh, Nader [1 ]
Alam, Monjur [1 ]
Zajic, Alenka [1 ]
Prvulovic, Milos [1 ]
机构
[1] Georgia Inst Technol, Atlanta, GA 30332 USA
来源
44TH ANNUAL INTERNATIONAL SYMPOSIUM ON COMPUTER ARCHITECTURE (ISCA 2017) | 2017年
基金
美国国家科学基金会;
关键词
Hardware Security; EM Emanation; Malware Detection; Internet-of-Things; SIDE-CHANNEL ATTACKS; INFORMATION LEAKAGE; MALWARE; MEMORY;
D O I
10.1145/3079856.3080223
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This paper describes EM-Based Detection of Deviations in Program Execution (EDDIE), a new method for detecting anomalies in program execution, such as malware and other code injections, without introducing any overheads, adding any hardware support, changing any software, or using any resources on the monitored system itself. Monitoring with EDDIE involves receiving electromagnetic (EM) emanations that are emitted as a side effect of execution on the monitored system, and it relies on spikes in the EM spectrum that are produced as a result of periodic (e.g. loop) activity in the monitored execution. During training, EDDIE characterizes normal execution behavior in terms of peaks in the EM spectrum that are observed at various points in the program execution, but it does not need any characterization of the malware or other code that might later be injected. During monitoring, EDDIE identifies peaks in the observed EM spectrum, and compares these peaks to those learned during training. Since EDDIE requires no resources on the monitored machine and no changes to the monitored software, it is especially well suited for security monitoring of embedded and IoT devices. We evaluate EDDIE on a real IoT system and in a cycle-accurate simulator, and find that even relatively brief injected bursts of activity (a few milliseconds) are detected by EDDIE with high accuracy, and that it also accurately detects when even a few instructions are injected into an existing loop within the application.
引用
收藏
页码:333 / 346
页数:14
相关论文
共 86 条
[1]   Control-Flow Integrity Principles, Implementations, and Applications [J].
Abadi, Martin ;
Budiu, Mihai ;
Erlingsson, Ulfar ;
Ligatti, Jay .
ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2009, 13 (01)
[2]  
Agrawal D, 2003, LECT NOTES COMPUT SC, V2779, P2, DOI 10.1007/978-3-540-45238-6_2
[3]  
Alazab M., 2011, AusDM, V11, P171, DOI DOI 10.5555/2483628.2483648
[4]   Empirical assessment of machine learning-based malware detectors for Android Measuring the gap between in-the-lab and in-the-wild validation scenarios [J].
Allix, Kevin ;
Bissyande, Tegawende F. ;
Jerome, Quentin ;
Klein, Jacques ;
State, Radu ;
Le Traon, Yves .
EMPIRICAL SOFTWARE ENGINEERING, 2016, 21 (01) :183-211
[5]  
[Anonymous], 23 USENIX SEC S
[6]  
[Anonymous], 2008, P 15 ACM C COMP COMM
[7]  
[Anonymous], 2005, NDSS
[8]  
[Anonymous], 1951, Journal of the American Statistical Association
[9]  
[Anonymous], UNSUPERVISED ANOMALY
[10]  
[Anonymous], P 2016 ACM SIGSAC C