Defending Hardware-Based Malware Detectors Against Adversarial Attacks
نویسندگان
چکیده
In the era of Internet Things (IoT), Malware has been proliferating exponentially over past decade. Traditional anti-virus software are ineffective against modern complex Malware. order to address this challenge, researchers have proposed hardware-assisted detection (HMD) using hardware performance counters (HPCs). The HPCs used train a set machine learning (ML) classifiers, which in turn, distinguish benign programs from Recently, adversarial attacks designed by introducing perturbations HPC traces an sample predictor misclassify program for specific HPCs. These with basic assumption that attacker is aware being detect Since processors consist hundreds HPCs, restricting only few them aids attacker. article, we propose moving target defense (MTD) attack designing multiple ML classifiers trained on different sets MTD randomly selects classifier; thus, confusing about or number applied. We developed analytical model proves probability guess perfect HPC-classifier combination extremely low (in range $10^{-1864}$ system 20 HPCs). Our experimental results prove able improve classification accuracy modified through generator up 31.5%, near (99.4%) restoration original accuracy.
منابع مشابه
Defending Non-Bayesian Learning against Adversarial Attacks
Abstract This paper addresses the problem of non-Bayesian learning over multi-agent networks, where agents repeatedly collect partially informative observations about an unknown state of the world, and try to collaboratively learn the true state. We focus on the impact of the adversarial agents on the performance of consensus-based non-Bayesian learning, where non-faulty agents combine local le...
متن کاملSATYA : Defending Against Adversarial Attacks Using Statistical Hypothesis Testing
The paper presents a new defense against adversarial attacks for deep neural networks. We demonstrate the effectiveness of our approach against the popular adversarial image generation method DeepFool. Our approach uses Wald’s Sequential Probability Ratio Test to sufficiently sample a carefully chosen neighborhood around an input image to determine the correct label of the image. On a benchmark...
متن کاملA Analyzing and Defending Against Web-based Malware
Web-based malware is a growing threat to today’s Internet security. Attacks of this type are prevalent and lead to serious security consequences. Millions of malicious URLs are used as distribution channels to propagate malware all over the Web. After being infected, victim systems fall in the control of attackers, who can utilize them for various cyber crimes such as stealing credentials, spam...
متن کاملDefending BitTorrent against Strategic Attacks
BitTorrent has shown to be efficient for bulk file transfer, however, it is susceptible to free riding by strategic clients like BitTyrant. Strategic peers configure the client software such that for very less or no contribution, they can obtain good download speeds. Such strategic nodes exploit the altruism in the swarm and consume resources at the expense of other honest nodes and create an u...
متن کاملDefending Against XML-Based Attacks Using State-Based XML Firewall
With the proliferation of service-oriented systems and cloud computing, web services security has gained much attention in recent years. Web service attacks, called XML-based attacks, typically occur at the SOAP message level, thus they are not readily handled by existing security mechanisms such as a conventional firewall. In order to provide effective security mechanisms for service-oriented ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems
سال: 2021
ISSN: ['1937-4151', '0278-0070']
DOI: https://doi.org/10.1109/tcad.2020.3026960