Hardware-Assisted Malware Detection using Explainable Machine Learning

被引:16
|
作者
Pan, Zhixin [1 ]
Sheldon, Jennifer [1 ]
Mishra, Prabhat [1 ]
机构
[1] Univ Florida, Dept Comp & Informat Sci & Engn, Gainesville, FL 32611 USA
关键词
Malware Detection; Explainable Learning;
D O I
10.1109/ICCD50377.2020.00113
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Malicious software, popularly known as malware, is widely acknowledged as a serious threat to modern computing systems. Software-based solutions, such as anti-virus software, are not effective since they rely on matching patterns that can be easily fooled by carefully crafted malware with obfuscation or other deviation capabilities. While recent malware detection methods provide promising results through effective utilization of hardware features, the detection results cannot be interpreted in a meaningful way. In this paper, we propose a hardware-assisted malware detection framework using explainable machine learning. This paper makes three important contributions. First, we theoretically establish that our proposed method can provide interpretable explanation of classification results to address the challenge of transparency. Next, we show that the explainable outcome can lead to accurate localization of malicious behaviors. Finally, experimental evaluation using a wide variety of real-world malware benchmarks demonstrates that our framework can produce accurate and human-understandable malware detection results with provable guarantees.
引用
收藏
页码:663 / 666
页数:4
相关论文
共 50 条
  • [41] Native Simulation of MPSoC Using Hardware-Assisted Virtualization
    Shen, Hao
    Hamayun, Mian-Muhammad
    Petrot, Frederic
    IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2012, 31 (07) : 1074 - 1087
  • [42] A Performance Study of Web Server Based on Hardware-assisted Virtual Machine
    Shao, Zhiyuan
    Jin, Hai
    Zhang, De
    2009 IEEE/ACS INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS, VOLS 1 AND 2, 2009, : 837 - 840
  • [43] Hardware-Assisted Intellectual Property Protection of Deep Learning Models
    Chakraborty, Abhishek
    Mondal, Ankit
    Srivastava, Ankur
    PROCEEDINGS OF THE 2020 57TH ACM/EDAC/IEEE DESIGN AUTOMATION CONFERENCE (DAC), 2020,
  • [44] A Novel Malware Analysis for Malware Detection and Classification using Machine Learning Algorithms
    Sethi, Kamalakanta
    Chaudhary, Shankar Kumar
    Tripathy, Bata Krishan
    Bera, Padmalochan
    SIN'17: PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON SECURITY OF INFORMATION AND NETWORKS, 2017, : 107 - 113
  • [45] Hardware-Assisted Machine Learning in Resource-Constrained IoT Environments for Security: Review and Future Prospective
    Kornaros, Georgios
    IEEE ACCESS, 2022, 10 : 58603 - 58622
  • [46] Hidden Process Detection System based on Hardware-assisted Virtualization
    Li, Xue-xiang
    An, Xue-qing
    Zhang, Wenning
    2013 SEVENTH INTERNATIONAL CONFERENCE ON INTERNET COMPUTING FOR ENGINEERING AND SCIENCE (ICICSE 2013), 2013, : 48 - 50
  • [47] HaLock: Hardware-Assisted Lock Contention Detection in Multithreaded Applications
    Huang, Yongbing
    Cui, Zehan
    Chen, Licheng
    Zhang, Wenli
    Bao, Yungang
    Chen, Mingyu
    PROCEEDINGS OF THE 21ST INTERNATIONAL CONFERENCE ON PARALLEL ARCHITECTURES AND COMPILATION TECHNIQUES (PACT'12), 2012, : 253 - 262
  • [48] HARD: Hardware-assisted lockset-based race detection
    Zhou, Pin
    Teodorescu, Radu
    Zhou, Yuanyuan
    THIRTEENTH INTERNATIONAL SYMPOSIUM ON HIGH-PERFORMANCE COMPUTER ARCHITECTURE, PROCEEDINGS, 2007, : 121 - +
  • [49] Machine learning-based cyber threat detection: an approach to malware detection and security with explainable AI insights
    Farida Siddiqi Prity
    Md. Shahidul Islam
    Emran Hossain Fahim
    Md. Maruf Hossain
    Sazzad Hossain Bhuiyan
    Md. Ariful Islam
    Mirza Raquib
    Human-Intelligent Systems Integration, 2024, 6 (1) : 61 - 90
  • [50] HyperCheck: A Hardware-Assisted Integrity Monitor
    Zhang, Fengwei
    Wang, Jiang
    Sun, Kun
    Stavrou, Angelos
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2014, 11 (04) : 332 - 344