Deep Neural Network and Transfer Learning for Accurate Hardware-Based Zero-Day Malware Detection

被引:12
作者
He, Zhangying [1 ]
Rezaei, Amin [1 ]
Homayoun, Houman [2 ]
Sayadi, Hossein [1 ]
机构
[1] Calif State Univ, Long Beach, CA 90032 USA
[2] Univ Calif Davis, Davis, CA 95616 USA
来源
PROCEEDINGS OF THE 32ND GREAT LAKES SYMPOSIUM ON VLSI 2022, GLSVLSI 2022 | 2022年
关键词
Deep Learning; Hardware-Based Malware Detection; Machine Learning; Transfer Learning; Zero-Day Attack;
D O I
10.1145/3526241.3530326
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In recent years, security researchers have shifted their attentions to the underlying processors' architecture and proposed Hardware-Based Malware Detection (HMD) countermeasures to address inefficiencies of software-based detection methods. HMD techniques apply standard Machine Learning (ML) algorithms to the processors' low-level events collected from Hardware Performance Counter (HPC) registers. However, despite obtaining promising results for detecting known malware, the challenge of accurate zero-day (unknown) malware detection has remained an unresolved problem in existing HPC-based countermeasures. Our comprehensive analysis shows that standard ML classifiers are not effective in recognizing zero-day malware traces using HPC events. In response, we propose Deep-HMD, a two-stage intelligent and flexible approach based on deep neural network and transfer learning, for accurate zero-day malware detection based on image-based hardware events. The experimental results indicate that our proposed solution outperforms existing ML-based methods by achieving a 97% detection rate (F-Measure and Area Under the Curve) for detecting zero-day malware signatures at run-time using the top 4 hardware events with a minimal false positive rate and no hardware redesign overhead.
引用
收藏
页码:27 / 32
页数:6
相关论文
共 28 条
[1]  
[Anonymous], 2013, ACM SIGARCH computer architecture news
[2]  
Bilge L., 2012, P 2012 ACM C COMP CO, P833, DOI DOI 10.1145/2382196.2382284
[3]  
Bradski G, 2000, DR DOBBS J, V25, P120
[4]   SoK: The Challenges, Pitfalls, and Perils of Using Hardware Performance Counters for Security [J].
Das, Sanjeev ;
Werner, Jan ;
Antonakakis, Manos ;
Polychronakis, Michalis ;
Monrose, Fabian .
2019 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2019), 2019, :20-38
[5]  
Elhadi Ammar Ahmed E., 2012, American Journal of Applied Sciences, V9, P283, DOI 10.3844/ajassp.2012.283.288
[6]   Livedoid vasculopathy and its association with genetic variants: A systematic review [J].
Gao, Yimeng ;
Jin, Hongzhong .
INTERNATIONAL WOUND JOURNAL, 2021, 18 (05) :616-625
[7]   MiBench: A free, commercially representative embedded benchmark suite [J].
Guthaus, MR ;
Ringenberg, JS ;
Ernst, D ;
Austin, TM ;
Mudge, T ;
Brown, RB .
WWC-4: IEEE INTERNATIONAL WORKSHOP ON WORKLOAD CHARACTERIZATION, 2001, :3-14
[8]   Deep Residual Learning for Image Recognition [J].
He, Kaiming ;
Zhang, Xiangyu ;
Ren, Shaoqing ;
Sun, Jian .
2016 IEEE CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR), 2016, :770-778
[9]   When Machine Learning Meets Hardware Cybersecurity: Delving into Accurate Zero-Day Malware Detection [J].
He, Zhangying ;
Miari, Tahereh ;
Makrani, Hosein Mohammadi ;
Aliasgari, Mehrdad ;
Homayoun, Houman ;
Sayadi, Hossein .
PROCEEDINGS OF THE 2021 TWENTY SECOND INTERNATIONAL SYMPOSIUM ON QUALITY ELECTRONIC DESIGN (ISQED 2021), 2021, :85-90
[10]  
Henning JL, 2006, ACM SIGARCH Computer Architecture News, V34, P1, DOI DOI 10.1145/1186736.1186737