Skip to main content

15.03.2024

Guarding Against the Unknown: Deep Transfer Learning for Hardware Image-Based Malware Detection

verfasst von: Zhangying He, Houman Homayoun, Hossein Sayadi

Erschienen in: Journal of Hardware and Systems Security

Einloggen, um Zugang zu erhalten

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Malware is increasingly becoming a significant threat to computing systems, and detecting zero-day (unknown) malware is crucial to ensure the security of modern systems. These attacks exploit software security vulnerabilities that are not documented or known in the detection mechanism’s database, making it particularly a pressing challenge to address. In recent times, there has been a shift in focus by security researchers toward the architecture of underlying processors. They have suggested implementing hardware-based malware detection (HMD) countermeasures to address the shortcomings of software-based detection methods. HMD techniques involve applying standard machine learning (ML) algorithms to low-level events of processors that are gathered from hardware performance counter (HPC) registers. While these techniques have shown promising results for detecting known malware, accurately recognizing zero-day malware remains an unsolved issue in the existing HPC-based detection methods. Our comprehensive analysis has revealed that standard ML classifiers are ineffective in identifying zero-day malware traces using HPC events. In response, we propose Deep-HMD, a multi-level intelligent and flexible approach based on deep neural network and transfer learning, for accurate zero-day malware detection using image-based hardware events. Deep-HMD first converts HPC-based malware and benign data into images, and subsequently employs a lightweight deep transfer learning methodology to obtain a high malware detection performance for both known and unknown test scenarios. To conduct a thorough analysis, three deep learning-based and nine standard ML algorithms are implemented and evaluated for hardware-based malware detection. The experimental results indicate that our proposed image-based malware detection solution achieves superior performance compared to all other methods, with a 97% detection performance (measured by F-measure and area under the curve) for run-time zero-day malware detection utilizing soley the top four performance counter events. Specifically, our novel approach outperforms the binarized MLP by 16% and the best classical ML algorithm by 18% in F-measure, while maintaining a minimal false positive rate and without incurring any hardware redesign overhead.
Literatur
2.
Zurück zum Zitat Demme J, Maycock M, Schmitz J, Tang A, Waksman A, Sethumadhavan S, Stolfo S (2013) On the feasibility of online malware detection with performance counters. In: Proceedings of the 40th Annual International Symposium on Computer Architecture. ISCA ’13. Association for Computing Machinery, New York, pp 559–570. https://doi.org/10.1145/2485922.2485970CrossRef Demme J, Maycock M, Schmitz J, Tang A, Waksman A, Sethumadhavan S, Stolfo S (2013) On the feasibility of online malware detection with performance counters. In: Proceedings of the 40th Annual International Symposium on Computer Architecture. ISCA ’13. Association for Computing Machinery, New York, pp 559–570. https://​doi.​org/​10.​1145/​2485922.​2485970CrossRef
3.
4.
Zurück zum Zitat Tang A, Sethumadhavan S, Stolfo SJ (2014) Unsupervised anomaly-based malware detection using hardware features. In: Stavrou A, Bos H, Portokalidis G (eds) Research in attacks, intrusions and defenses. Springer, Cham, pp 109–129CrossRef Tang A, Sethumadhavan S, Stolfo SJ (2014) Unsupervised anomaly-based malware detection using hardware features. In: Stavrou A, Bos H, Portokalidis G (eds) Research in attacks, intrusions and defenses. Springer, Cham, pp 109–129CrossRef
5.
Zurück zum Zitat He Z, Rezaei A, Homayoun H, Sayadi H (2022) Deep neural network and transfer learning for accurate hardware-based zero-day malware detection. In: Proceedings of the great lakes symposium on VLSI 2022. GLSVLSI ’22, pp 27–32. Association for Computing Machinery, New York. https://doi.org/10.1145/3526241.3530326CrossRef He Z, Rezaei A, Homayoun H, Sayadi H (2022) Deep neural network and transfer learning for accurate hardware-based zero-day malware detection. In: Proceedings of the great lakes symposium on VLSI 2022. GLSVLSI ’22, pp 27–32. Association for Computing Machinery, New York. https://​doi.​org/​10.​1145/​3526241.​3530326CrossRef
6.
Zurück zum Zitat Singh B, Evtyushkin D, Elwell J, Riley R, Cervesato I (2017) On the detection of kernel-level rootkits using hardware performance counters. In: Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security. ASIA CCS ’17. Association for Computing Machinery, New York, pp 483–493. https://doi.org/10.1145/3052973.3052999CrossRef Singh B, Evtyushkin D, Elwell J, Riley R, Cervesato I (2017) On the detection of kernel-level rootkits using hardware performance counters. In: Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security. ASIA CCS ’17. Association for Computing Machinery, New York, pp 483–493. https://​doi.​org/​10.​1145/​3052973.​3052999CrossRef
8.
Zurück zum Zitat Sayadi H, Makrani HM, Pudukotai Dinakarrao SM, Mohsenin T, Sasan A, Rafatirad S, Homayoun H (2019) 2smart: A two-stage machine learning-based approach for run-time specialized hardware-assisted malware detection. In: 2019 design, automation test in europe conference exhibition (DATE), pp 728–733. https://doi.org/10.23919/DATE.2019.8715080CrossRef Sayadi H, Makrani HM, Pudukotai Dinakarrao SM, Mohsenin T, Sasan A, Rafatirad S, Homayoun H (2019) 2smart: A two-stage machine learning-based approach for run-time specialized hardware-assisted malware detection. In: 2019 design, automation test in europe conference exhibition (DATE), pp 728–733. https://​doi.​org/​10.​23919/​DATE.​2019.​8715080CrossRef
11.
12.
Zurück zum Zitat Bilge L, Dumitras T (2012) Before we knew it: An empirical study of zero-day attacks in the real world. In: Proceedings of the 2012 ACM Conference on CCS. CCS ’12. ACM, New York, pp 833–844 Bilge L, Dumitras T (2012) Before we knew it: An empirical study of zero-day attacks in the real world. In: Proceedings of the 2012 ACM Conference on CCS. CCS ’12. ACM, New York, pp 833–844
18.
Zurück zum Zitat Reddi VJ, Settle A, Connors DA, Cohn RS (2004) Pin: a binary instrumentation tool for computer architecture research and education. In: Proceedings of the 2004 workshop on computer architecture education: held in conjunction with the 31st international symposium on computer architecture, p 22 Reddi VJ, Settle A, Connors DA, Cohn RS (2004) Pin: a binary instrumentation tool for computer architecture research and education. In: Proceedings of the 2004 workshop on computer architecture education: held in conjunction with the 31st international symposium on computer architecture, p 22
19.
Zurück zum Zitat Mucci PJ, Browne S, Deane C, Ho G (1999) Papi: A portable interface to hardware performance counters. In: Proceedings of the department of defense HPCMP users group conference, vol 710 Mucci PJ, Browne S, Deane C, Ho G (1999) Papi: A portable interface to hardware performance counters. In: Proceedings of the department of defense HPCMP users group conference, vol 710
20.
Zurück zum Zitat Reinders J (2005) VTune Performance analyzer essentials: measurement and tuning techniques for software developers. Intel Press, Engineer to Engineer Series Reinders J (2005) VTune Performance analyzer essentials: measurement and tuning techniques for software developers. Intel Press, Engineer to Engineer Series
23.
Zurück zum Zitat Zhou B, Gupta A, Jahanshahi R, Egele M, Joshi A (2018) Hardware performance counters can detect malware: Myth or fact? In: Proceedings of the 2018 on Asia conference on computer and communications security. ASIACCS ’18. Association for Computing Machinery, New York, pp 457–468. https://doi.org/10.1145/3196494.3196515CrossRef Zhou B, Gupta A, Jahanshahi R, Egele M, Joshi A (2018) Hardware performance counters can detect malware: Myth or fact? In: Proceedings of the 2018 on Asia conference on computer and communications security. ASIACCS ’18. Association for Computing Machinery, New York, pp 457–468. https://​doi.​org/​10.​1145/​3196494.​3196515CrossRef
24.
Zurück zum Zitat Guthaus MR, Ringenberg JS, Ernst D, Austin TM, Mudge T, Brown RB (2001) Mibench: A free, commercially representative embedded benchmark suite. In: Proceedings of the fourth annual IEEE International Workshop on workload characterization. WWC-4 (Cat. No.01EX538), pp 3–14. https://doi.org/10.1109/WWC.2001.990739CrossRef Guthaus MR, Ringenberg JS, Ernst D, Austin TM, Mudge T, Brown RB (2001) Mibench: A free, commercially representative embedded benchmark suite. In: Proceedings of the fourth annual IEEE International Workshop on workload characterization. WWC-4 (Cat. No.01EX538), pp 3–14. https://​doi.​org/​10.​1109/​WWC.​2001.​990739CrossRef
25.
Zurück zum Zitat Henning JL (2006) Spec cpu2006 benchmark descriptions. SIGARCH Comput. Archit. News 34(4):1–17CrossRef Henning JL (2006) Spec cpu2006 benchmark descriptions. SIGARCH Comput. Archit. News 34(4):1–17CrossRef
26.
Zurück zum Zitat Pedregosa F, Varoquaux G, Gramfort A, Michel V, Thirion B, Grisel O, Blondel M, Prettenhofer P, Weiss R, Dubourg V, Vanderplas J, Passos A, Cournapeau D, Brucher M, Perrot M, Duchesnay E (2011) Scikit-learn: Machine learning in python. J Mach Learn Res 12(null):2825–2830MathSciNet Pedregosa F, Varoquaux G, Gramfort A, Michel V, Thirion B, Grisel O, Blondel M, Prettenhofer P, Weiss R, Dubourg V, Vanderplas J, Passos A, Cournapeau D, Brucher M, Perrot M, Duchesnay E (2011) Scikit-learn: Machine learning in python. J Mach Learn Res 12(null):2825–2830MathSciNet
27.
Zurück zum Zitat Kraskov A, Stögbauer H, Grassberger P (2003) Estimating mutual information. Physical review. E, Statistical, nonlinear and soft matter physics 69 6 Pt 2:066138 Kraskov A, Stögbauer H, Grassberger P (2003) Estimating mutual information. Physical review. E, Statistical, nonlinear and soft matter physics 69 6 Pt 2:066138
30.
Zurück zum Zitat Raff E, Barker J, Sylvester J, Brandon R, Catanzaro B, Nicholas C (2017) Malware detection by eating a whole EXE Raff E, Barker J, Sylvester J, Brandon R, Catanzaro B, Nicholas C (2017) Malware detection by eating a whole EXE
31.
Zurück zum Zitat Shukla S, Kolhe G, Sai Manoj P, Rafatirad S (2019) Work-in-progress: Microarchitectural events and image processing-based hybrid approach for robust malware detection. In: 2019 International Conference on Compliers, Architectures and Synthesis for Embedded Systems (CASES), pp 1–2 Shukla S, Kolhe G, Sai Manoj P, Rafatirad S (2019) Work-in-progress: Microarchitectural events and image processing-based hybrid approach for robust malware detection. In: 2019 International Conference on Compliers, Architectures and Synthesis for Embedded Systems (CASES), pp 1–2
37.
Zurück zum Zitat Tan C, Sun F, Kong T, Zhang W, Yang C, Liu C (2018) A survey on deep transfer learning. In: Kurkova V, Manolopoulos Y, Hammer B, Iliadis L, Maglogiannis I (eds) Artificial neural networks and machine learning – ICANN 2018. Springer, Cham, pp 270–279CrossRef Tan C, Sun F, Kong T, Zhang W, Yang C, Liu C (2018) A survey on deep transfer learning. In: Kurkova V, Manolopoulos Y, Hammer B, Iliadis L, Maglogiannis I (eds) Artificial neural networks and machine learning – ICANN 2018. Springer, Cham, pp 270–279CrossRef
38.
39.
Zurück zum Zitat Bradski G (2000) The OpenCV Library. Dr. Dobb’s Journal of Software Tools Bradski G (2000) The OpenCV Library. Dr. Dobb’s Journal of Software Tools
42.
Zurück zum Zitat Yosinski J, Clune J, Bengio Y, Lipson H (2014) How transferable are features in deep neural networks? In: Proceedings of the 27th international conference on neural information processing systems - Volume 2. NIPS’14, MIT Press, Cambridge, pp 3320–3328 Yosinski J, Clune J, Bengio Y, Lipson H (2014) How transferable are features in deep neural networks? In: Proceedings of the 27th international conference on neural information processing systems - Volume 2. NIPS’14, MIT Press, Cambridge, pp 3320–3328
44.
Zurück zum Zitat Smith LN (2018) A disciplined approach to neural network hyper-parameters: Part 1 – learning rate, batch size, momentum, and weight decay Smith LN (2018) A disciplined approach to neural network hyper-parameters: Part 1 – learning rate, batch size, momentum, and weight decay
45.
Zurück zum Zitat Wang E, Davis JJ, Moro D, Zielinski P, Lim JJ, Coelho C, Chatterjee S, Cheung PYK, Constantinides GA (2023) Enabling binary neural network training on the edge. ACM Trans Embed Comput Syst 22(6). https://doi.org/10.1145/3626100 Wang E, Davis JJ, Moro D, Zielinski P, Lim JJ, Coelho C, Chatterjee S, Cheung PYK, Constantinides GA (2023) Enabling binary neural network training on the edge. ACM Trans Embed Comput Syst 22(6). https://​doi.​org/​10.​1145/​3626100
46.
Zurück zum Zitat Maaten L, Hinton G (2008) Visualizing data using t-sne. J Mach Learn Res 9(86):2579–2605 Maaten L, Hinton G (2008) Visualizing data using t-sne. J Mach Learn Res 9(86):2579–2605
47.
Zurück zum Zitat Tran D, Liu JZ, Dusenberry MW, Phan D, Collier M, Ren JJ, Han K, Wang Z, Mariet ZE, Hu H, Band N, Rudner TGJ, Singhal K, Nado Z, Amersfoort JR, Kirsch A, Jenatton R, Thain N, Yuan H et al (2022) Plex: Towards reliability using pretrained large model extensions. ArXiv abs/2207.07411 Tran D, Liu JZ, Dusenberry MW, Phan D, Collier M, Ren JJ, Han K, Wang Z, Mariet ZE, Hu H, Band N, Rudner TGJ, Singhal K, Nado Z, Amersfoort JR, Kirsch A, Jenatton R, Thain N, Yuan H et al (2022) Plex: Towards reliability using pretrained large model extensions. ArXiv abs/2207.07411
48.
Zurück zum Zitat Lee K, Lee K, Lee H, Shin J (2018) A simple unified framework for detecting out-of-distribution samples and adversarial attacks. In: Proceedings of the 32nd international conference on neural information processing systems. NIPS’18. Curran Associates Inc, Red Hook, pp 7167–7177 Lee K, Lee K, Lee H, Shin J (2018) A simple unified framework for detecting out-of-distribution samples and adversarial attacks. In: Proceedings of the 32nd international conference on neural information processing systems. NIPS’18. Curran Associates Inc, Red Hook, pp 7167–7177
Metadaten
Titel
Guarding Against the Unknown: Deep Transfer Learning for Hardware Image-Based Malware Detection
verfasst von
Zhangying He
Houman Homayoun
Hossein Sayadi
Publikationsdatum
15.03.2024
Verlag
Springer International Publishing
Erschienen in
Journal of Hardware and Systems Security
Print ISSN: 2509-3428
Elektronische ISSN: 2509-3436
DOI
https://doi.org/10.1007/s41635-024-00146-6