首页> 外文会议>International Symposium on Microarchitecture >RHMD: Evasion-Resilient Hardware Malware Detectors
【24h】

RHMD: Evasion-Resilient Hardware Malware Detectors

机译:RHMD:逃避弹性硬件恶意软件探测器

获取原文

摘要

Hardware Malware Detectors (HMDs) have recently been proposed as a defense against the proliferation of malware. These detectors use low-level features, that can be collected by the hardware performance monitoring units on modern CPUs to detect malware as a computational anomaly. Several aspects of the detector construction have been explored, leading to detectors with high accuracy. In this paper, we explore the question of how well evasive malware can avoid detection by HMDs. We show that existing HMDs can be effectively reverse-engineered and subsequently evaded, allowing malware to hide from detection without substantially slowing it down (which is important for certain types of malware). This result demonstrates that the current generation of HMDs can be easily defeated by evasive malware. Next, we explore how well a detector can evolve if it is exposed to this evasive malware during training. We show that simple detectors, such as logistic regression, cannot detect the evasive malware even with retraining. More sophisticated detectors can be retrained to detect evasive malware, but the retrained detectors can be reverse-engineered and evaded again. To address these limitations, we propose a new type of Resilient HMDs (RHMDs) that stochastically switch between different detectors. These detectors can be shown to be provably more difficult to reverse engineer based on resent results in probably approximately correct (PAC) learnability theory. We show that indeed such detectors are resilient to both reverse engineering and evasion, and that the resilience increases with the number and diversity of the individual detectors. Our results demonstrate that these HMDs offer effective defense against evasive malware at low additional complexity.
机译:最近已经提出了硬件恶意软件探测器(HMDS)作为防止恶意软件的扩散的防御。这些探测器使用低级功能,可以通过现代CPU上的硬件性能监控单元收集,以检测恶意软件作为计算异常。已经探索了探测器结构的几个方面,导致高精度的探测器。在本文中,我们探讨了避免恶意软件如何避免汉德检测的问题。我们表明现有的HMD可以有效地逆向设计并随后逃避,允许恶意软件隐藏免测,而不会使其降低(这对于某些类型的恶意软件很重要)。这结果表明,目前的HMDS的产生可以通过避免恶意软件容易地击败。接下来,我们探讨探测器在训练期间暴露于这种避免的恶意软件,探测器可以发展。我们展示了即使通过再培训,简单的探测器如逻辑回归,例如逻辑回归也无法检测到避免的恶意软件。可以烫伤更复杂的探测器以检测避免恶意软件,但是烫伤的探测器可以反向设计并再次逃避。为了解决这些限制,我们提出了一种新型的弹性HMDS(RHMD),其随机切换在不同的探测器之间。这些探测器可以被证明可以基于大致正确(PAC)可读性理论的重构结果来逆向工程师。我们表明,实际上这种探测器对逆向工程和逃避具有弹性,并且弹性随着各个探测器的数量和多样性而增加。我们的结果表明,这些HMDS在低额外复杂性处以避免的恶意软件提供有效的防御。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号