首页> 外文会议>Conference on disruptive technologies in sensors and sensor systems >Verification of OpenSSL Version via Hardware Performance Counters
【24h】

Verification of OpenSSL Version via Hardware Performance Counters

机译:通过硬件性能计数器验证OpenSSL版本

获取原文

摘要

Many forms of malware and security breaches exist today. One type of breach downgrades a cryptographic program by employing a man-in-the-middle attack. In this work, we explore the utilization of hardware events in conjunction with machine learning algorithms to detect which version of OpenSSL is being run during the encryption process. This allows for the immediate detection of any unknown downgrade attacks in real time. Our experimental results indicated this detection method is both feasible and practical. When trained with normal TLS and SSL data, our classifier was able to detect which protocol was being used with 99.995% accuracy. After the scope of the hardware event recording was enlarged, the accuracy diminished greatly, but to 53.244%. Upon removal of TLS 1.1 from the data set, the accuracy returned to 99.905%.
机译:今天存在许多形式的恶意软件和安全漏洞。一种类型的违规通过使用中间人攻击来降级加密程序。在这项工作中,我们探讨了与机器学习算法结合使用硬件事件的利用,以检测在加密过程中正在运行哪个版本的openssl。这允许立即检测任何未知的降级攻击实时。我们的实验结果表明,这种检测方法既可行又实用。当用正常的TLS和SSL数据训练时,我们的分类器能够检测到哪些协议以99.995%的精度使用。在扩大硬件事件记录的范围后,精度大大减少,但为53.244%。从数据集中移除TLS 1.1后,精度恢复为99.905%。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号