Affiliation:
1. University of Arizona, Tucson, AZ
Abstract
Malware is a serious threat to network-connected embedded systems, as evidenced by the continued and rapid growth of such devices, commonly referred to as the Internet of Things. Their ubiquitous use in critical applications require robust protection to ensure user safety and privacy. That protection must be applied to all system aspects, extending beyond protecting the network and external interfaces. Anomaly detection is one of the last lines of defence against malware, in which data-driven approaches that require the least domain knowledge are popular. However, embedded systems, particularly edge devices, face several challenges in applying data-driven anomaly detection, including unpredictability of malware, limited tolerance to long data collection windows, and limited computing/energy resources. In this article, we utilize subcomponent timing information of software execution, including intrinsic software execution, instruction cache misses, and data cache misses as features, to detect anomalies based on ranges, multi-dimensional Euclidean distance, and classification at runtime. Detection methods based on lumped timing range are also evaluated and compared. We design several hardware detectors implementing these data-driven detection methods, which non-intrusively measuring lumped/subcomponent timing of all system/function calls of the embedded application. We evaluate the area, power, and detection latency of the presented detector designs. Experimental results demonstrate that the subcomponent timing model provides sufficient features to achieve high detection accuracy with low false-positive rates using a one-class support vector machine, considering sophisticated mimicry malware.
Publisher
Association for Computing Machinery (ACM)
Subject
Electrical and Electronic Engineering,Computer Graphics and Computer-Aided Design,Computer Science Applications
Reference46 articles.
1. ARM. 2011. Embedded Trace Macrocell ETMv1.0 to ETMv3.5 Architecture Specification. ARM. 2011. Embedded Trace Macrocell ETMv1.0 to ETMv3.5 Architecture Specification.
2. Kernel density estimation via diffusion
3. G. Cai J. Dias and L. Seneviratne. 2014. A survey of small-scale unmanned aerial vehicles: Recent advances and future development trends. Unman. Syst. 2 (2014). G. Cai J. Dias and L. Seneviratne. 2014. A survey of small-scale unmanned aerial vehicles: Recent advances and future development trends. Unman. Syst. 2 (2014).
4. V. Chandola A. Banerjee and V. Kumar. 2009. Anomaly detection: A survey. ACM Comput. Surv. 41 3 (2009). 10.1145/1541880.1541882 V. Chandola A. Banerjee and V. Kumar. 2009. Anomaly detection: A survey. ACM Comput. Surv. 41 3 (2009). 10.1145/1541880.1541882
Cited by
9 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献