Malware-aware processors: A framework for efficient online malware detection

Meltem Ozsoy, Caleb Donovick, Iakov Gorelik, N. Abu-Ghazaleh, D. Ponomarev
{"title":"Malware-aware processors: A framework for efficient online malware detection","authors":"Meltem Ozsoy, Caleb Donovick, Iakov Gorelik, N. Abu-Ghazaleh, D. Ponomarev","doi":"10.1109/HPCA.2015.7056070","DOIUrl":null,"url":null,"abstract":"Security exploits and ensuant malware pose an increasing challenge to computing systems as the variety and complexity of attacks continue to increase. In response, software-based malware detection tools have grown in complexity, thus making it computationally difficult to use them to protect systems in real-time. Therefore, software detectors are applied selectively and at a low frequency, creating opportunities for malware to remain undetected. In this paper, we propose Malware-Aware Processors (MAP) - processors augmented with an online hardware-based detector to serve as the first line of defense to differentiate malware from legitimate programs. The output of this detector helps the system prioritize how to apply more expensive software-based solutions. The always-on nature of MAP detector helps protect against intermittently operating malware. Our work improves on the state of the art in the following ways: (1) We define and explore the use of sub-semantic features for online detection of malware. (2) We explore hardware implementations and show that simple classifiers appropriate for such implementations can effectively classify malware. We also study different classifiers, develop implementation optimizations, and explore complexity to performance trade-offs. (3) We propose a two-level detection framework where the hardware classifier prioritizes the work of a more accurate but more expensive software defense mechanism. (4) We integrate the MAP implementation with an open-source x86-compatible core, synthesizing the resulting design to run on an FPGA.","PeriodicalId":6593,"journal":{"name":"2015 IEEE 21st International Symposium on High Performance Computer Architecture (HPCA)","volume":"18 1","pages":"651-661"},"PeriodicalIF":0.0000,"publicationDate":"2015-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"140","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2015 IEEE 21st International Symposium on High Performance Computer Architecture (HPCA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/HPCA.2015.7056070","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 140

Abstract

Security exploits and ensuant malware pose an increasing challenge to computing systems as the variety and complexity of attacks continue to increase. In response, software-based malware detection tools have grown in complexity, thus making it computationally difficult to use them to protect systems in real-time. Therefore, software detectors are applied selectively and at a low frequency, creating opportunities for malware to remain undetected. In this paper, we propose Malware-Aware Processors (MAP) - processors augmented with an online hardware-based detector to serve as the first line of defense to differentiate malware from legitimate programs. The output of this detector helps the system prioritize how to apply more expensive software-based solutions. The always-on nature of MAP detector helps protect against intermittently operating malware. Our work improves on the state of the art in the following ways: (1) We define and explore the use of sub-semantic features for online detection of malware. (2) We explore hardware implementations and show that simple classifiers appropriate for such implementations can effectively classify malware. We also study different classifiers, develop implementation optimizations, and explore complexity to performance trade-offs. (3) We propose a two-level detection framework where the hardware classifier prioritizes the work of a more accurate but more expensive software defense mechanism. (4) We integrate the MAP implementation with an open-source x86-compatible core, synthesizing the resulting design to run on an FPGA.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
恶意软件感知处理器:一个有效的在线恶意软件检测框架
随着攻击的多样性和复杂性不断增加,安全漏洞和恶意软件对计算系统构成了越来越大的挑战。作为回应,基于软件的恶意软件检测工具已经变得越来越复杂,因此使用它们来实时保护系统在计算上变得困难。因此,软件检测器被选择性地以低频率应用,为恶意软件创造了不被检测到的机会。在本文中,我们提出了恶意软件感知处理器(MAP)——带有在线硬件检测器的处理器,作为区分恶意软件和合法程序的第一道防线。该检测器的输出帮助系统优先考虑如何应用更昂贵的基于软件的解决方案。MAP检测器的始终在线特性有助于防止间歇性操作的恶意软件。我们的工作在以下方面改进了目前的技术水平:(1)我们定义并探索了在线检测恶意软件的子语义特征的使用。(2)我们探索了硬件实现,并表明适合于这些实现的简单分类器可以有效地对恶意软件进行分类。我们还研究了不同的分类器,开发了实现优化,并探讨了性能权衡的复杂性。(3)我们提出了一个两级检测框架,其中硬件分类器优先考虑更准确但更昂贵的软件防御机制的工作。(4)我们将MAP实现与一个开源的x86兼容内核集成在一起,将最终的设计综合到FPGA上运行。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Parameter Identification Inverse Problems of Partial Differential Equations Based on the Improved Gene Expression Programming High-Efficiency Realization of SRT Division on Ternary Optical Computers A Fast Training Method for Transductive Support Vector Machine in Semi-supervised Learning Performance Optimization of a DEM Simulation Framework on GPU Using a Stencil Model A Platform for Routine Development of Ternary Optical Computers
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1