Akoman: Hardware-Level Malware Detection Using Discrete Wavelet Transform

被引:1
作者
Alizadeh, Niloofar S. [1 ]
Abadi, Mahdi [1 ]
机构
[1] Tarbiat Modares Univ, Dept Comp Engn, Tehran, Iran
来源
2018 IEEE INTERNATIONAL CONFERENCE ON SMART COMPUTING (SMARTCOMP 2018) | 2018年
关键词
discrete wavelet transform; Haar wavelet; hardware event; malware detection;
D O I
10.1109/SMARTCOMP.2018.00049
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Malware, short for malicious software, is a general collective term for any program that gains access to a system without the knowledge of the owner and fulfills the malicious intent of an attacker. Over the past few years, various techniques have been proposed that focus on the run-time behavior of programs in order to dynamically detect malware. Most of the techniques rely on the analysis of system call traces provided by the underlying operating system. An alternative and promising approach is to perform malware detection at the hardware level. In this paper, we pursue this line of research by presenting Akoman, a novel technique that uses hardware events in current modern processors to build behavioral models of malware. Akoman follows a two-stage heuristic matching strategy to rapidly determine whether or not a running program belongs to a known malware family. It first applies the singular value decomposition to select candidate malware families that the running program is most likely to belong to. Then, it applies the Haar-based discrete wavelet transform to determine whether the running program is benign or it is matched to one of the selected candidate malware families. Our proof-of-concept evaluations performed on a real dataset of benign programs and malware samples suggest Akoman achieves negligible overhead with acceptable detection performance.
引用
收藏
页码:476 / 481
页数:6
相关论文
共 20 条
  • [1] Adaptive thresholding of wavelet coefficients
    Abramovich, F
    Benjamini, Y
    [J]. COMPUTATIONAL STATISTICS & DATA ANALYSIS, 1996, 22 (04) : 351 - 361
  • [2] [Anonymous], 1992, CBMS-NSF Reg. Conf. Ser. in Appl. Math
  • [3] [Anonymous], 2018, INT 64 IA 32 ARCH SO
  • [4] Bahador MB, 2014, 2014 4TH INTERNATIONAL CONFERENCE ON COMPUTER AND KNOWLEDGE ENGINEERING (ICCKE), P703, DOI 10.1109/ICCKE.2014.6993402
  • [5] Banerjee S., 2014, LINEAR ALGEBRA MATRI
  • [6] Bayer U, 2006, J COMPUT VIROL HACKI, V2, P67, DOI 10.1007/s11416-006-0012-2
  • [7] Bellard F, 2005, USENIX Association Proceedings of the FREENIX/Open Source Track, P41
  • [8] Birchfield Stan, 2016, IMAGE PROCESSING ANA, P2
  • [9] Discrete Wavelet Transform-Based Time Series Analysis and Mining
    Chaovalit, Pimwadee
    Gangopadhyay, Aryya
    Karabatis, George
    Chen, Zhiyuan
    [J]. ACM COMPUTING SURVEYS, 2011, 43 (02)
  • [10] Christodorescu M, 2003, USENIX ASSOCIATION PROCEEDINGS OF THE 12TH USENIX SECURITY SYMPOSIUM, P169