Malware Detection on General-Purpose Computers Using Power Consumption Monitoring: A Proof of Concept and Case Study

نویسندگان

  • Jarilyn M. Hernández Jiménez
  • Jeffrey A. Nichols
  • Katerina Goseva-Popstojanova
  • Stacy J. Prowell
  • Robert A. Bridges
چکیده

Malware detection is challenging when faced with automatically generated and polymorphic malware, as well as with rootkits, which are exceptionally hard to detect. In an attempt to contribute towards addressing these challenges, we conducted a proof of concept study that explored the use of power consumption for detection of malware presence in a generalpurpose computer. The results of our experiments indicate that malware indeed leaves a signal on the power consumption of a general-purpose computer. Specifically, for the case study based on two different rootkits, the data collected at the +12V rails on the motherboard showed the most noticeable increment of the power consumption after the computer was infected. Our future work includes experimenting with more malware examples and workloads, and developing data analytics approach for automatic malware detection based on power consumption.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Towards a Malware Detection Framework Based on Power Consumption Monitoring

As our personal, organizational, and critical infrastructure are increasingly dependent on networked computing assets, malicious software —malware—is one of the most serious national security threats. Common malware detection practices are proving insufficient, and the task poses significant challenges when faced with automatically generated and polymorphic malware, as well as rootkits, which a...

متن کامل

VirusMeter: Preventing Your Cellphone from Spies

Due to the rapid advancement of mobile communication technology, mobile devices nowadays can support a variety of data services that are not traditionally available. With the growing popularity of mobile devices in the last few years, attacks targeting them are also surging. Existing mobile malware detection techniques, which are often borrowed from solutions to Internet malware detection, do n...

متن کامل

بررسی عوامل مؤثر بر مصرف بهینه برق رایانه‌های شخصی در یک مرکز آموزش عالی در سال 1393: یک گزارش کوتاه

Background and Objective: Computer is one of the most common office equipment that spends around 25% energy consumption in an administrative building. As an action toward resistive economy policy in saving energy, we conducted a study on affecting factors on personal computers (PCs) power consumption in an academic center. Materials and Methods: This research was a cross-sectional study...

متن کامل

An automated approach to analysis and classification of Crypto-ransomwares’ family

There is no doubt that malicious programs are one of the permanent threats to computer systems. Malicious programs distract the normal process of computer systems to apply their roguish purposes. Meanwhile, there is also a type of malware known as the ransomware that limits victims to access their computer system either by encrypting the victimchr('39')s files or by locking the system. Despite ...

متن کامل

When Firmware Modifications Attack: A Case Study of Embedded Exploitation

The ability to update firmware is a feature that is found in nearly all modern embedded systems. We demonstrate how this feature can be exploited to allow attackers to inject malicious firmware modifications into vulnerable embedded devices. We discuss techniques for exploiting such vulnerable functionality and the implementation of a proof of concept printer malware capable of network reconnai...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • CoRR

دوره abs/1705.01977  شماره 

صفحات  -

تاریخ انتشار 2017