A Novel Algorithm for Detecting GSMem Attacks

被引:0
|
作者
Zhu, Weijun [1 ]
Nie, Kai [1 ]
Ban, Shaohuan [1 ]
Fan, Yongwen [1 ]
Wang, Jianwei [1 ]
机构
[1] Zhengzhou Univ, Sch Informat Engn, Zhengzhou 450001, Henan, Peoples R China
基金
中国博士后科学基金; 中国国家自然科学基金;
关键词
air-gapped computer; GSMem; single instruction multiple data;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
GSMem is a malware which is against air-gapped computers. Up to now, no method can detect it. To this end, this paper puts forward an algorithm for detecting GSMem. At first, the new algorithm detects whether or not there exists a thread in memory, which periodically calls the MOVNTDQ instruction. If such a thread occurs, a binary character string which is generated from the periodical call, will be matched with another binary character string which expresses some confidential information. And the new algorithm determines whether a GSMem attack occurs or not according to the result of the match. The simulation results show that the new algorithm can detect a GSMem in air-gapped networks in principle. The complexity analysis demonstrates that the new algorithm can complete its task within polynomial time.
引用
收藏
页码:855 / 858
页数:4
相关论文
共 50 条
  • [31] A Novel Algorithm of Detecting Martial Arts Shots
    Zhai Guangyu
    Cao Jianwen
    2010 INTERNATIONAL CONFERENCE ON BIO-INSPIRED SYSTEMS AND SIGNAL PROCESSING (ICBSSP 2010), 2010, : 144 - 146
  • [32] Detecting BrakTooth Attacks
    Nandikotkur, Achyuth
    Traore, Issa
    Mamun, Mohammad
    PROCEEDINGS OF THE 20TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, SECRYPT 2023, 2023, : 787 - 792
  • [33] Detecting attacks on networks
    Herringshaw, C
    COMPUTER, 1997, 30 (12) : 16 - 17
  • [34] A novel algorithm for embedding and detecting digital watermarks
    Feng, GR
    Jiang, LG
    He, C
    Wang, DF
    2003 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING, VOL III, PROCEEDINGS: IMAGE & MULTIDIMENSIONAL SIGNAL PROCESSING SIGNAL, PROCESSING EDUCATION, 2003, : 549 - 552
  • [35] A Novel Trust Model In Detecting Final-Phase Attacks in Substations
    Boakye-Boateng, Kwasi
    Ghorbani, Ali A.
    Lashkari, Arash Habibi
    2021 18TH INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2021,
  • [36] MARC: A Novel Framework for Detecting MITM Attacks in eHealthcare BLE Systems
    Yaseen, Muhammad
    Iqbal, Waseem
    Rashid, Imran
    Abbas, Haider
    Mohsin, Ahid
    Saleem, Kashif
    Bangash, Yawar Abbas
    JOURNAL OF MEDICAL SYSTEMS, 2019, 43 (11)
  • [37] MARC: A Novel Framework for Detecting MITM Attacks in eHealthcare BLE Systems
    Muhammad Yaseen
    Waseem Iqbal
    Imran Rashid
    Haider Abbas
    Mujahid Mohsin
    Kashif Saleem
    Yawar Abbas Bangash
    Journal of Medical Systems, 2019, 43
  • [38] A Feature Selection Algorithm to Find Optimal Feature Subsets for Detecting DoS Attacks
    Kang, Seung-Ho
    2015 5TH INTERNATIONAL CONFERENCE ON IT CONVERGENCE AND SECURITY (ICITCS), 2015,
  • [39] Detecting Network Attacks on Software Configured Networks Using the Isolating Forest Algorithm
    M. D. Stepanov
    E. Yu. Pavlenko
    D. S. Lavrova
    Automatic Control and Computer Sciences, 2021, 55 : 1039 - 1050
  • [40] The Parameter Optimization Based on LVPSO Algorithm for Detecting Multi-step Attacks
    Jiang, Jianguo
    Wang, Qiwen
    Shi, Zhixin
    Lv, Bin
    Fan, Wei
    Peng, Xiao
    CF '19 - PROCEEDINGS OF THE 16TH ACM INTERNATIONAL CONFERENCE ON COMPUTING FRONTIERS, 2019, : 24 - 31