2016
DOI: 10.1145/2857055
|View full text |Cite
|
Sign up to set email alerts
|

Hardware Performance Counter-Based Malware Identification and Detection with Adaptive Compressive Sensing

Abstract: Counter-based (HPC) runtime checking is an effective way to identify malicious behaviors of malware and detect malicious modifications to a legitimate program's control flow. To reduce the overhead in the monitored system which has limited storage and computing resources, we present a "sample-locally-analyze-remotely" technique. The sampled HPC data are sent to a remote server for further analysis. To minimize the I/O bandwidth required for transmission, the fine-grained HPC profiles are compressed into much s… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
17
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 50 publications
(17 citation statements)
references
References 28 publications
0
17
0
Order By: Relevance
“…Initially, HPCs have been employed for investigating the static and dynamic analysis of programs to detect any malicious amendments as mentioned in Alam et al (2020) and Malone, Zahran & Karri (2011). Several studies (Das et al, 2019;Demme et al, 2013;Singh et al, 2017;Wang et al, 2016) discuss potential implications of using HPC for application analysis, and the majority of them suggest that hardware execution profile can effectuate the detection of malware (Demme et al, 2013;Singh et al, 2017;Wang et al, 2016;Kuruvila, Kundu & Basu, 2020). Another study (Xu et al, 2017) has utilized the hardware execution profiles to detect malware using machine learning algorithms, as malware changes data structures and control flow, leaving fingerprints on accesses to program memory.…”
Section: Introductionmentioning
confidence: 99%
“…Initially, HPCs have been employed for investigating the static and dynamic analysis of programs to detect any malicious amendments as mentioned in Alam et al (2020) and Malone, Zahran & Karri (2011). Several studies (Das et al, 2019;Demme et al, 2013;Singh et al, 2017;Wang et al, 2016) discuss potential implications of using HPC for application analysis, and the majority of them suggest that hardware execution profile can effectuate the detection of malware (Demme et al, 2013;Singh et al, 2017;Wang et al, 2016;Kuruvila, Kundu & Basu, 2020). Another study (Xu et al, 2017) has utilized the hardware execution profiles to detect malware using machine learning algorithms, as malware changes data structures and control flow, leaving fingerprints on accesses to program memory.…”
Section: Introductionmentioning
confidence: 99%
“…Despite good accuracy, the computational overheads posed are high, and employs large number of HPCs for classification. One of the recent works [106] uses "samplelocally-analyze-remotely" technique, where the HPCs are collected locally, but analyzed on a server. Compressed sensing is utilized to minimize the communication bandwidth.…”
Section: E Malware Detection At Node-level: Comparison With the State-of-the-artmentioning
confidence: 99%
“…Wang et al [32] have used hardware interaction based features for building malware detection system.…”
Section: H Hardware Featuresmentioning
confidence: 99%