Barnum: Detecting Document Malware via Control Flow Anomalies in Hardware Traces

被引:12
|
作者
Yagemann, Carter [1 ]
Sultana, Salmin [2 ]
Chen, Li [2 ]
Lee, Wenke [1 ]
机构
[1] Georgia Inst Technol, Atlanta, GA 30332 USA
[2] Intel Labs, Secur & Privacy Res, Hillsboro, OR 97124 USA
来源
关键词
Malware; Automated analysis; Classification; Deep-learning; SYSTEMS; PDF;
D O I
10.1007/978-3-030-30215-3_17
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper proposes Barnum, an offline control flow attack detection system that applies deep learning on hardware execution traces to model a program's behavior and detect control flow anomalies. Our implementation analyzes document readers to detect exploits and ABI abuse. Recent work has proposed using deep learning based control flow classification to build more robust and scalable detection systems. These proposals, however, were not evaluated against different kinds of control flow attacks, programs, and adversarial perturbations. We investigate anomaly detection approaches to improve the security coverage and scalability of control flow attack detection. Barnum is an end-to-end system consisting of three major components: (1) trace collection, (2) behavior modeling, and (3) anomaly detection via binary classification. It utilizes Intel (R) Processor Trace for low overhead execution tracing and applies deep learning on the basic block sequences reconstructed from the trace to train a normal program behavior model. Based on the path prediction accuracy of the model, Barnum then determines a decision boundary to classify benign vs. malicious executions. We evaluate against 8 families of attacks to Adobe Acrobat Reader and 9 to Microsoft Word on Windows 7. Both readers are complex programs with over 50 dynamically linked libraries, just-in-time compiled code and frequent network I/O. Barnum shows its effectiveness with 0% false positive and 2.4% false negative on a dataset of 1,250 benign and 1,639 malicious PDFs. Barnum is robust against evasion techniques as it successfully detects 500 adversarially perturbed PDFs.
引用
收藏
页码:341 / 359
页数:19
相关论文
共 13 条
  • [1] Detecting anomalies in DNS protocol traces via passive testing and process mining
    Saint-Pierre, Cecilia
    Cifuentes, Francisco
    Bustos-Jimenez, Javier
    [J]. 2014 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2014, : 520 - 521
  • [2] Using Page Offsets for Detecting Control-Flow Anomalies
    Varan, Engincan
    Hanifi, Khadija
    Erdemli, Aysegul Rana
    Unal, Musa
    Tat, Yunus Emre
    Tekinoglu, Dilara
    Cetin, Orcun
    Fuladi, Ramin
    Yilmaz, Cemal
    [J]. INNOVATIVE SECURITY SOLUTIONS FOR INFORMATION TECHNOLOGY AND COMMUNICATIONS, SECITC 2023, 2024, 14534 : 13 - 25
  • [3] Post-silicon verification and debugging with control flow traces and patchable hardware
    Fujita, Masahiro
    [J]. 2012 IEEE INTERNATIONAL HIGH LEVEL DESIGN VALIDATION AND TEST WORKSHOP (HLDVT), 2012, : 100 - 107
  • [4] Efficient and Robust Malware Detection Based on Control Flow Traces Using Deep Neural Networks
    Qiang, Weizhong
    Yang, Lin
    Jin, Hai
    [J]. COMPUTERS & SECURITY, 2022, 122
  • [5] Detecting Anomalies in Concurrent Programs based on Dynamic Control Flow Changes
    Ullah, Faheem
    Gross, Thomas R.
    [J]. 2016 IEEE 30TH INTERNATIONAL PARALLEL AND DISTRIBUTED PROCESSING SYMPOSIUM WORKSHOPS (IPDPSW), 2016, : 308 - 317
  • [6] Detecting self-mutating malware using control-flow graph matching
    Bruschi, Danilo
    Martignoni, Lorenzo
    Monga, Mattia
    [J]. DETECTION OF INTRUSIONS AND MALWARE & VULNERABILITY ASSESSMENT, PROCEEDINGS, 2006, 4064 : 129 - 143
  • [7] Soteria: Detecting Adversarial Examples in Control Flow Graph-based Malware Classifiers
    Alasmary, Hisham
    Abusnaina, Ahmed
    Jang, Rhongho
    Abuhamad, Mohammed
    Anwar, Afsah
    Nyang, DaeHun
    Mohaisen, David
    [J]. 2020 IEEE 40TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS), 2020, : 888 - 898
  • [8] Efficient Control-Flow Subgraph Matching for Detecting Hardware Trojans in RTL Models
    Piccolboni, Luca
    Menon, Alessandro
    Pravadelli, Graziano
    [J]. ACM TRANSACTIONS ON EMBEDDED COMPUTING SYSTEMS, 2017, 16
  • [9] NumChecker: Detecting Kernel Control-flow Modifying Rootkits by Using Hardware Performance Counters
    Wang, Xueyang
    Karri, Ramesh
    [J]. 2013 50TH ACM / EDAC / IEEE DESIGN AUTOMATION CONFERENCE (DAC), 2013,
  • [10] A malware detection system using a hybrid approach of multi-heads attention-based control flow traces and image visualization
    Ullah, Farhan
    Srivastava, Gautam
    Ullah, Shamsher
    [J]. JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS, 2022, 11 (01):