skip to main content
10.1145/3123939.3123972acmconferencesArticle/Chapter ViewAbstractPublication PagesmicroConference Proceedingsconference-collections
research-article
Public Access

RHMD: evasion-resilient hardware malware detectors

Published: 14 October 2017 Publication History

Abstract

Hardware Malware Detectors (HMDs) have recently been proposed as a defense against the proliferation of malware. These detectors use low-level features, that can be collected by the hardware performance monitoring units on modern CPUs to detect malware as a computational anomaly. Several aspects of the detector construction have been explored, leading to detectors with high accuracy. In this paper, we explore the question of how well evasive malware can avoid detection by HMDs. We show that existing HMDs can be effectively reverse-engineered and subsequently evaded, allowing malware to hide from detection without substantially slowing it down (which is important for certain types of malware). This result demonstrates that the current generation of HMDs can be easily defeated by evasive malware. Next, we explore how well a detector can evolve if it is exposed to this evasive malware during training. We show that simple detectors, such as logistic regression, cannot detect the evasive malware even with retraining. More sophisticated detectors can be retrained to detect evasive malware, but the retrained detectors can be reverse-engineered and evaded again. To address these limitations, we propose a new type of Resilient HMDs (RHMDs) that stochastically switch between different detectors. These detectors can be shown to be provably more difficult to reverse engineer based on resent results in probably approximately correct (PAC) learnability theory. We show that indeed such detectors are resilient to both reverse engineering and evasion, and that the resilience increases with the number and diversity of the individual detectors. Our results demonstrate that these HMDs offer effective defense against evasive malware at low additional complexity.

References

[1]
Sherly Abraham and InduShobha Chengalur-Smith. 2010. An overview of social engineering malware: Trends, tactics, and implications. Technology in Society 32, 3 (2010), 183--196.
[2]
Sruthi Bandhakavi, Samuel T King, Parthasarathy Madhusudan, and Marianne Winslett. 2010. VEX: Vetting Browser Extensions for Security Vulnerabilities. In USENIX Security Symposium, Vol. 10. 339--354.
[3]
Marco Barreno, Blaine Nelson, Anthony D Joseph, and JD Tygar. 2010. The security of machine learning. Machine Learning 81, 2 (2010), 121--148.
[4]
Battista Biggio, Igino Corona, Davide Maiorca, Blaine Nelson, Nedim Šrndić, Pavel Laskov, Giorgio Giacinto, and Fabio Roli. 2013. Evasion attacks against machine learning at test time. In Joint European Conference on Machine Learning and Knowledge Discovery in Databases. Springer, 387--402.
[5]
Battista Biggio, Giorgio Fumera, and Fabio Roli. 2008. Adversarial pattern classification using multiple classifiers and randomisation. Structural, Syntactic, and Statistical Pattern Recognition (2008), 500--509.
[6]
Battista Biggio, Blaine Nelson, and Pavel Laskov. 2012. Poisoning attacks against support vector machines. arXiv preprint arXiv:1206.6389 (2012).
[7]
Daniel Bilar. 2007. Opcodes as predictor for malware. International Journal of Electronic Security and Digital Forensics 1, 2 (2007), 156--168.
[8]
Danilo Bruschi, Lorenzo Cavallaro, and Andrea Lanzi. 2007. An efficient technique for preventing mimicry and impossible paths execution attacks. In Performance, Computing, and Communications Conference, 2007. IPCCC 2007. IEEE Internationa. IEEE, 418--425.
[9]
Juan Caballero, Chris Grier, Christian Kreibich, and Vern Paxson. 2011. Measuring Pay-per-Install: The Commoditization of Malware Distribution. In Usenix security symposium. 15.
[10]
Jie Chen and Guru Venkataramani. 2014. Cc-hunter: Uncovering covert timing channels on shared processor hardware. In Microarchitecture (MICRO), 2014 47th Annual IEEE/ACM International Symposium on. IEEE, 216--228.
[11]
Richard Colbaugh and Kristin Glass. 2012. Predictive defense against evolving adversaries. In Intelligence and Security Informatics (ISI), 2012 IEEE International Conference on. IEEE, 18--23.
[12]
John Demme, Matthew Maycock, Jared Schmitz, Adrian Tang, Adam Waksman, Simha Sethumadhavan, and Salvatore Stolfo. 2013. On the feasibility of online malware detection with performance counters. ACM SIGARCH Computer Architecture News 41, 3 (2013), 559--570.
[13]
Artem Dinaburg, Paul Royal, Monirul Sharif, and Wenke Lee. 2008. Ether: malware analysis via hardware virtualization extensions. In Proceedings of the 15th ACM conference on Computer and communications security (CCS). 51--62.
[14]
Harris Drucker, Donghui Wu, and Vladimir N Vapnik. 1999. Support vector machines for spam categorization. IEEE Transactions on Neural networks 10, 5 (1999), 1048--1054.
[15]
Manuel Egele, Theodoor Scholte, Engin Kirda, and Christopher Kruegel. 2012. A survey on automated dynamic malware-analysis techniques and tools. ACM Computing Surveys (CSUR) 44, 2 (2012).
[16]
Dmitry Evtyushkin, Dmitry Ponomarev, and Nael Abu-Ghazaleh. 2016. Understanding and mitigating covert channels through branch predictors. ACM Transactions on Architecture and Code Optimization (TACO) 13, 1 (2016), 10.
[17]
Tal Garfinkel, Ben Pfaff, Jim Chow, Mendel Rosenblum, and Dan Boneh. 2003. Terra: A virtual machine-based platform for trusted computing. In ACM SIGOPS Operating Systems Review, Vol. 37. ACM, 193--206.
[18]
Ian J Goodfellow, Jonathon Shlens, and Christian Szegedy. 2014. Explaining and harnessing adversarial examples. arXiv preprint arXiv:1412.6572 (2014).
[19]
Guofei Gu, Phillip Porras, Vinod Yegneswaran, Martin Fong, and Wenke Lee. 2007. BotHunter: Detecting Malware Infection Through IDS-driven Dialog Correlation. In Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium.
[20]
John L Henning. 2006. SPEC CPU2006 benchmark descriptions. ACM SIGARCH Computer Architecture News 34, 4 (2006), 1--17.
[21]
Casen Hunger, Mikhail Kazdagli, Ankit Rawat, Alex Dimakis, Sriram Vishwanath, and Mohit Tiwari. 2015. Understanding contention-based channels and using them for defense. In High Performance Computer Architecture (HPCA), 2015 IEEE 21st International Symposium on. IEEE, 639--650.
[22]
Nwokedi Idika and Aditya P Mathur. 2007. A survey of malware detection techniques. Purdue University 48 (2007).
[23]
Mehmet Kayaalp, Dmitry Ponomarev, Nael Abu-Ghazaleh, and Aamer Jaleel. 2016. A high-resolution side-channel attack on last-level cache. In Design Automation Conference (DAC), 2016 53nd ACM/EDAC/IEEE. IEEE, 1--6.
[24]
Mehmet Kayaalp, Timothy Schmitt, Junaid Nomani, Dmitry Ponomarev, and Nael Abu-Ghazaleh. 2013. SCRAP: Architecture for signature-based protection from code reuse attacks. In High Performance Computer Architecture (HPCA2013), 2013 IEEE 19th International Symposium on. IEEE, 258--269.
[25]
Mikhail Kazdagli, Ling Huang, Vijay Reddi, and Mohit Tiwari. 2016. EMMA: A New Platform to Evaluate Hardware-based Mobile Malware Analyses. CoRR abs/1603.03086 (2016). http://arxiv.org/abs/1603.03086
[26]
Mikhail Kazdagli, Vijay Janapa Reddi, and Mohit Tiwari. 2016. Quantifying and improving the efficiency of hardware-based mobile malware detectors. In Microarchitecture (MICRO), 2016 49th Annual IEEE/ACM International Symposium on. IEEE, 1--13.
[27]
Khaled N. Khasawneh, Meltem Ozsoy, Caleb Donovick, Nael Abu-Ghazaleh, and Dmitry Ponomarev. 2015. Ensemble Learning for Low-Level Hardware-Supported Malware Detection. In Proceedings of the 18th International Symposium on Research in Attacks, Intrusions, and Defenses - Volume 9404 (RAID 2015). Springer-Verlag New York, Inc., New York, NY, USA, 3--25.
[28]
Marius Kloft and Pavel Laskov. 2010. Online anomaly detection under adversarial impact. In Proceedings of the Thirteenth International Conference on Artificial Intelligence and Statistics. 405--412.
[29]
Pavel Laskov and Nedim Šrndić. 2014. Practical evasion of a learning-based classifier: A case study. In 2014 IEEE Symposium on Security and Privacy. IEEE, 197--211.
[30]
Chi-Keung Luk, Robert Cohn, Robert Muth, Harish Patil, Artur Klauser, Geoff Lowney, Steven Wallace, Vijay Janapa Reddi, and Kim Hazelwood. 2005. Pin: building customized program analysis tools with dynamic instrumentation. In Acm sigplan notices, Vol. 40. ACM, 190--200.
[31]
Malwaredb. 2010. Liste Malware. (2010). Available online (last accessed, May 2015): www.malwaredb.malekal.com.
[32]
Lorenzo Martignoni, Mihai Christodorescu, and Somesh Jha. 2007. Omniunpack: Fast, generic, and safe unpacking of malware. In Computer Security Applications Conference, 2007. ACSAC 2007. Twenty-Third Annual. IEEE, 431--441.
[33]
Gary McGraw and Greg Morrisett. 2000. Attacking malicious code: A report to the Infosec Research Council. IEEE software 17, 5 (2000), 33--41.
[34]
Tom M Mitchell. 1997. Machine Learning. McGraw-Hill.
[35]
Andreas Moser, Christopher Kruegel, and Engin Kirda. 2007. Limits of static analysis for malware detection. In Computer security applications conference, 2007. ACSAC 2007. Twenty-third annual. IEEE, 421--430.
[36]
Carey Nachenberg. 1997. Computer virus-antivirus coevolution. Commun. ACM 40, 1 (1997), 46--51.
[37]
Hoda Naghibijouybari and Nael Abu-Ghazaleh. 2017. Covert Channels on GPG-PUs. IEEE Computer Architecture Letters 16, 1 (2017), 22--25.
[38]
Aleksander Osman. 2014. The AO486 project. (2014). http://opencores.org/project,ao486
[39]
Meltem Ozsoy, Caleb Donovick, Iakov Gorelik, Nael Abu-Ghazaleh, and Dmitry Ponomarev. 2015. Malware-aware processors: A framework for efficient online malware detection. In High Performance Computer Architecture (HPCA), 2015 IEEE 21st International Symposium on. IEEE, 651--661.
[40]
Meltem Ozsoy, Khaled N Khasawneh, Caleb Donovick, Iakov Gorelik, Nael Abu-Ghazaleh, and Dmitry Ponomarev. 2016. Hardware-Based Malware Detection Using Low-Level Architectural Features. IEEE Trans. Comput. 65, 11 (2016), 3332--3344.
[41]
Nicolas Papernot, Patrick McDaniel, Ian Goodfellow, Somesh Jha, Z Berkay Celik, and Ananthram Swami. 2016. Practical black-box attacks against deep learning systems using adversarial examples. arXiv preprint arXiv:1602.02697 (2016).
[42]
Colin Percival. 2005. Cache missing for fun and profit. (2005).
[43]
Qualcomm 2016. Qualcomm Smart Protect Technology. (2016). Last Accessed July 2016 from https://www.qualcomm.com/products/snapdragon/security/smart-protect.
[44]
Neha Runwal, Richard M Low, and Mark Stamp. 2012. Opcode graph similarity and metamorphic detection. Journal in Computer Virology 8, 1--2 (2012), 37--52.
[45]
Igor Santos, Felix Brezo, Javier Nieves, Yoseba K Penya, Borja Sanz, Carlos Laorden, and Pablo G Bringas. 2010. Idea: Opcode-sequence-based malware detection. In Engineering Secure Software and Systems. Springer, 35--43.
[46]
Hovav Shacham. 2007. The Geometry of Innocent Flesh on the Bone: Return-into-libc without Function Calls (on the x86). In Proceedings of CCS 2007. ACM Press, 552--61.
[47]
Reza Shokri, Marco Stronati, and Vitaly Shmatikov. 2016. Membership inference attacks against machine learning models. arXiv preprint arXiv:1610.05820 (2016).
[48]
Ed Skoudis and Lenny Zeltser. 2004. Malware: Fighting malicious code. Prentice Hall Professional.
[49]
Charles Smutz and Angelos Stavrou. 2016. When a Tree Falls: Using Diversity in Ensemble Classifiers to Identify Evasion in Malware Detectors. In Proceedings of Network and Distributed System Security Symposium (NDSS).
[50]
Adrian Tang, Simha Sethumadhavan, and Salvatore J Stolfo. 2014. Unsupervised anomaly-based malware detection using hardware features. In International Symposium on Recent Advances in Intrusion Detection (RAID). 109--129.
[51]
Florian Tramèr, Fan Zhang, Ari Juels, Michael K Reiter, and Thomas Ristenpart. 2016. Stealing machine learning models via prediction apis. In USENIX Security.
[52]
Yevgeniy Vorobeychik and Bo Li. 2014. Optimal randomized classification in adversarial settings. In Proceedings of the 2014 international conference on Autonomous agents and multi-agent systems. International Foundation for Autonomous Agents and Multiagent Systems, 485--492.
[53]
Ke Wang, Janak Parekh, and Salvatore Stolfo. 2006. Anagram: A content anomaly detector resistant to mimicry attack. In Recent Advances in Intrusion Detection. Springer, 226--248.
[54]
Kenneth C Wilbur and Yi Zhu. 2009. Click fraud. Marketing Science 28, 2 (2009), 293--308.
[55]
Weilin Xu, Yanjun Qi, and David Evans. 2016. Automatically evading classifiers. In Proceedings of the 2016 Network and Distributed Systems Symposium.
[56]
Guanhua Yan, Nathan Brown, and Deguang Kong. 2013. Exploring discriminatory features for automated malware classification. In Detection of Intrusions and Malware, and Vulnerability Assessment. Springer, 41--61.
[57]
Heng Yin, Dawn Song, Manuel Egele, Christopher Kruegel, and Engin Kirda. 2007. Panorama: capturing system-wide information flow for malware detection and analysis. In Proceedings of the 14th ACM conference on Computer and communications security (CCS). 116--127.
[58]
Ilsun You and Kangbin Yim. 2010. Malware Obfuscation Techniques: A Brief Survey. In Proc. International Conference on Broadband, Wireless Computing, Communications and Applications (BWCCA). 297--300.

Cited By

View all
  • (2025)SUNDEW: A Case-Sensitive Detection Engine to Counter Malware DiversityIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2024.340669922:1(518-533)Online publication date: Jan-2025
  • (2024)Beyond Conventional Defenses: Proactive and Adversarial-Resilient Hardware Malware Detection using Deep Reinforcement LearningProceedings of the 61st ACM/IEEE Design Automation Conference10.1145/3649329.3658252(1-6)Online publication date: 23-Jun-2024
  • (2024)SideGuard: Non-Invasive On-Chip Malware Detection in Heterogeneous IoT Systems by Leveraging Side-Channels2024 IEEE Security and Privacy Workshops (SPW)10.1109/SPW63631.2024.00030(253-259)Online publication date: 23-May-2024
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
MICRO-50 '17: Proceedings of the 50th Annual IEEE/ACM International Symposium on Microarchitecture
October 2017
850 pages
ISBN:9781450349529
DOI:10.1145/3123939
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 14 October 2017

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. HMDs
  2. adversarial machine learning
  3. malware detection

Qualifiers

  • Research-article

Funding Sources

Conference

MICRO-50
Sponsor:

Acceptance Rates

Overall Acceptance Rate 484 of 2,242 submissions, 22%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)129
  • Downloads (Last 6 weeks)19
Reflects downloads up to 08 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2025)SUNDEW: A Case-Sensitive Detection Engine to Counter Malware DiversityIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2024.340669922:1(518-533)Online publication date: Jan-2025
  • (2024)Beyond Conventional Defenses: Proactive and Adversarial-Resilient Hardware Malware Detection using Deep Reinforcement LearningProceedings of the 61st ACM/IEEE Design Automation Conference10.1145/3649329.3658252(1-6)Online publication date: 23-Jun-2024
  • (2024)SideGuard: Non-Invasive On-Chip Malware Detection in Heterogeneous IoT Systems by Leveraging Side-Channels2024 IEEE Security and Privacy Workshops (SPW)10.1109/SPW63631.2024.00030(253-259)Online publication date: 23-May-2024
  • (2024)Intelligent Malware Detection based on Hardware Performance Counters: A Comprehensive Survey2024 25th International Symposium on Quality Electronic Design (ISQED)10.1109/ISQED60706.2024.10528369(1-10)Online publication date: 3-Apr-2024
  • (2024)ReminISCence: Trusted Monitoring Against Privileged Preemption Side-Channel AttacksComputer Security – ESORICS 202410.1007/978-3-031-70903-6_2(24-44)Online publication date: 5-Sep-2024
  • (2023)SecureVolt: Enhancing Deep Neural Networks Security via UndervoltingIEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems10.1109/TCAD.2023.329637942:12(4922-4933)Online publication date: Dec-2023
  • (2023)Adversarial Attacks Against Machine Learning-Based Resource Provisioning SystemsIEEE Micro10.1109/MM.2023.326748143:5(35-44)Online publication date: 19-Jun-2023
  • (2023)HUND: Enhancing Hardware Performance Counter Based Malware Detection Under System Resource Competition Using Explanation Method2023 IEEE Symposium on Computers and Communications (ISCC)10.1109/ISCC58397.2023.10218007(1020-1026)Online publication date: 9-Jul-2023
  • (2023)Deep Learning Techniques for Malware Detection: A Comprehensive Survey2023 International Conference on Computer, Electronics & Electrical Engineering & their Applications (IC2E3)10.1109/IC2E357697.2023.10262691(1-7)Online publication date: 8-Jun-2023
  • (2023)Stochastic-HMDs: Adversarial-Resilient Hardware Malware Detectors via Undervolting2023 60th ACM/IEEE Design Automation Conference (DAC)10.1109/DAC56929.2023.10247980(1-6)Online publication date: 9-Jul-2023
  • Show More Cited By

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Login options

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media