HMD-Hardener: Adversarially Robust and Efficient Hardware-Assisted Runtime Malware Detection

被引:4
|
作者
Dhavlle, Abhijitt [1 ]
Shukla, Sanket [1 ]
Rafatirad, Setareh [2 ]
Homayoun, Houman [2 ]
Dinakarrao, Sai Manoj Pudukotai [1 ]
机构
[1] George Mason Univ, Fairfax, VA 22030 USA
[2] Univ Calif Davis, Davis, CA 95616 USA
关键词
D O I
10.23919/DATE51398.2021.9474036
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
To overcome the performance overheads incurred by the traditional software-based malware detection techniques, machine learning (ML) based Hardware-assisted Malware Detection (HMD) has emerged as a panacea to detect malicious applications and provide security. HMD primarily relies on the generated low-level microarchitectural events captured through Hardware Performance Counters (HPCs). This work proposes an adversarial attack on the HMD systems to tamper the security by introducing perturbations in performance counter traces with an adversarial sample generator application. To craft the attack, we first deploy an adversarial sample predictor to predict the adversarial HPC pattern for a given application to be misclassified by the deployed ML classifier in the HMD. Further, as the attacker has no direct access to manipulate the HPCs generated during runtime, based on the adversarial sample predictor's output, devise an adversarial sample generator wrapped around the victim application to produce HPC patterns similar to the adversarial predictor's estimated trace. With the proposed attack, malware detection accuracy is reduced to 18.1% from 82%. To render the HMD robust to such attacks, we further propose adversarially training the HMD to demonstrate that hardening can render HMD resilient against attacks; the detection accuracy post hardening raises to 81.2%.
引用
收藏
页码:1769 / 1774
页数:6
相关论文
共 50 条
  • [31] Breakthrough to Adaptive and Cost-Aware Hardware-Assisted Zero-Day Malware Detection: A Reinforcement Learning-Based Approach
    He, Zhangying
    Makrani, Hosein Mohammadi
    Rafatirad, Setareh
    Homayoun, Houman
    Sayadi, Hossein
    [J]. 2022 IEEE 40TH INTERNATIONAL CONFERENCE ON COMPUTER DESIGN (ICCD 2022), 2022, : 231 - 238
  • [32] Efficient Hardware-assisted Logging with Asynchronous and Direct-Update for Persistent Memory
    Jeong, Jungi
    Park, Chang Hyun
    Huh, Jaehyuk
    Maeng, Seungryoul
    [J]. 2018 51ST ANNUAL IEEE/ACM INTERNATIONAL SYMPOSIUM ON MICROARCHITECTURE (MICRO), 2018, : 520 - 532
  • [33] USB-Watch: A Dynamic Hardware-Assisted USB Threat Detection Framework
    Denney, Kyle
    Erdin, Enes
    Babun, Leonardo
    Vai, Michael
    Uluagac, Selcuk
    [J]. SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM, PT I, 2019, 304 : 126 - 146
  • [34] USB-Watch: a Generalized Hardware-Assisted Insider Threat Detection Framework
    Kyle Denney
    Leonardo Babun
    A. Selcuk Uluagac
    [J]. Journal of Hardware and Systems Security, 2020, 4 (2) : 136 - 149
  • [35] Hardware-assisted detection of firmware attacks in inverter-based cyberphysical microgrids
    Kuruvila, Abraham Peedikayil
    Zografopoulos, Ioannis
    Basu, Kanad
    Konstantinou, Charalambos
    [J]. INTERNATIONAL JOURNAL OF ELECTRICAL POWER & ENERGY SYSTEMS, 2021, 132 (132)
  • [36] Hardware-assisted fine-grained code-reuse attack detection
    20155201716533
    [J]. (1) State Key Laboratory for Novel Software Technology, Nanjing University, Nanjing, China; (2) Department of Computer Science and Technology, Nanjing University, Nanjing, China; (3) School of Information Systems, Singapore Management University, Singapore, Singapore, 1600, Asterisk Research, Inc.; Deloitte Tohmatsu Risk Services Co., Ltd.; Farsight Security, Inc.; NTT Communications Corporation; Tapad Inc. (Springer Verlag):
  • [37] A Hardware-Assisted Energy-Efficient Processing Model for Activity Recognition Using Wearables
    Ghasemzadeh, Hassan
    Fallahzadeh, Ramin
    Jafari, Roozbeh
    [J]. ACM TRANSACTIONS ON DESIGN AUTOMATION OF ELECTRONIC SYSTEMS, 2016, 21 (04)
  • [38] Accurate and Robust Malware Detection: Running XGBoost on Runtime Data From Performance Counters
    Elnaggar, Rana
    Servadei, Lorenzo
    Mathur, Shubham
    Wille, Robert
    Ecker, Wolfgang
    Chakrabarty, Krishnendu
    [J]. IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2022, 41 (07) : 2066 - 2079
  • [39] Towards Accurate Run-Time Hardware-Assisted Stealthy Malware Detection: A Lightweight, yet Effective Time Series CNN-Based Approach
    Sayadi, Hossein
    Gao, Yifeng
    Mohammadi Makrani, Hosein
    Lin, Jessica
    Costa, Paulo Cesar
    Rafatirad, Setareh
    Homayoun, Houman
    [J]. CRYPTOGRAPHY, 2021, 5 (04)
  • [40] 2SMaRT: A Two-Stage Machine Learning-Based Approach for Run-Time Specialized Hardware-Assisted Malware Detection
    Sayadi, Hossein
    Makrani, Hosein Mohammadi
    Dinakarrao, Sai Manoj Pudukotai
    Mohsenin, Tinoosh
    Sasan, Avesta
    Rafatirad, Setareh
    Homayoun, Houman
    [J]. 2019 DESIGN, AUTOMATION & TEST IN EUROPE CONFERENCE & EXHIBITION (DATE), 2019, : 728 - 733