Skip to main content

Micro-architectural Features for Malware Detection

  • Conference paper
  • First Online:

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 626))

Abstract

As the variety and complexity of attacks continue to increase, software-based malware detection can impose significant performance overhead. Recent works have demonstrated the feasibility of malware detection using hardware performance counters. Therefore, equipping a malware detector to collect and analyze micro-architecture features of CPUs to recognize malware at running time has become a promising method. In comparison to the software-based malware detection, hardware-based malware detection not only reduces the cost of system performance, but also possesses better detection capacity. However, hundreds of micro-architecture events can be monitored by hardware performance counters (HPCs) which are widely available in prevailing CPUs, such as Intel, ARM and so on. In this paper, we take Intel ivy bridge i3 processor as an example and examine most of these micro-architectural features. Instead of relying on experience, the Lasso algorithm is employed to reduce the dimensionality of feature vector to 6 elements. Furthermore, 4 classification methods based on supervised learning are applied for the selected features. We improve the classification accuracy rate of 15 % on average. The results show that the micro-architectural features of this paper can reveal the behaviors of malware better.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Demme, J., Maycock, M., Schmitz, J., et al.: On the feasibility of online malware detection with performance counters. ACM SIGARCH Comput. Archit. News 41(3), 559–570 (2013)

    Article  Google Scholar 

  2. Ozsoy, M., Donovick, C., Gorelik, I., et al.: Malware-aware processors: a framework for efficient online malware detection. In: 2015 IEEE 21st International Symposium on High Performance Computer Architecture, pp. 651–661 (2015)

    Google Scholar 

  3. Stone-Gross, B., Abman, R., Kemmerer, R., Kruegel, C., Steigerwald, D., Vigna, G.: The underground economy of fake antivirus software. In: Schneier, B. (ed.) Economics of Information Security and Privacy III, pp. 55–78. Springer, New York (2013)

    Chapter  Google Scholar 

  4. Lanzi, A., Balzarotti, D., Kruegel, C., Christodorescu, M., Kirda, E.: Accessminer: using system-centric models for malware protection. In: Proceeding of the 17th ACM Conference on Computer and Communications Security, pp. 399–412 (2010)

    Google Scholar 

  5. Christodorescu, M., Jha, S., Kruegel, C.: Mining specifications of malicious behavior. In: Proceedings of the 6th Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering, ESEC-FSE 07, p. 514 (2007)

    Google Scholar 

  6. McAfee Labs Report 2016 Threats Predictions. http://www.mcafee.com/us/resources/reports/rp-threats-predictions-2016.pdf

  7. Tibshirani, R.: Regression shrinkage and selection via the lasso. J. Roy. Stat. Soc.: Ser. B (Methodol.) 58, 267–288 (1996)

    MathSciNet  MATH  Google Scholar 

  8. Bulpin, J.R., Pratt, I.: Hyper-threading aware process scheduling heuristics. In: USENIX Annual Technical Conference, General Track, pp. 399–402 (2005)

    Google Scholar 

  9. Malone, C., Zahran, M., Karri, R.: Are hardware performance counters a cost effective way for integrity checking of programs. In: Proceedings of the Sixth ACM Workshop on Scalable Trusted Computing, pp. 71–76. ACM (2011)

    Google Scholar 

  10. Contreras, G., Martonosi, M.: Power prediction for intel XScale processors using performance monitoring unit events. In: Proceedings of the 2005 International Symposium on Low Power Electronics and Design, ISLPED 2005, pp. 221–226. IEEE (2005)

    Google Scholar 

  11. Cohen, I., Chase, J.S., Goldszmidt, M., et al.: Correlating instrumentation data to system states: a building block for automated diagnosis and control. In: OSDI, p. 16 (2004)

    Google Scholar 

  12. Guide, P.: Intel 64 and IA-32 Architectures Software Developers Manual. Volume 3B: System programming Guide, Part 2. Chaps. 18,19 (2011)

    Google Scholar 

  13. VirusSign. http://www.virussign.com/index.html

  14. VirusTotal. https://www.virustotal.com/

  15. Intel VTune Amplifier 2016. https://software.intel.com/en-us/intel-vtune-amplifier-xe

  16. Tang, A., Sethumadhavan, S., Stolfo, S.J.: Unsupervised anomaly-based malware detection using hardware features. In: Stavrou, A., Bos, H., Portokalidis, G. (eds.) RAID 2014. LNCS, vol. 8688, pp. 109–129. Springer, Heidelberg (2014)

    Google Scholar 

  17. Guyon, I., Elisseeff, A.: An introduction to variable and feature selection. J. Mach. Learn. Res. 3, 1157–1182 (2003)

    MATH  Google Scholar 

  18. Shen, K., Zhong, M., Dwarkadas, S., et al.: Hardware counter driven on-the-fly request signatures. ACM SIGARCH Comput. Archit. News 36(1), 189–200 (2008)

    Article  Google Scholar 

  19. Hoste, K., Eeckhout, L.: Comparing benchmarks using key microarchitecture-independent characteristics. In: 2006 IEEE International Symposium on Workload Characterization, pp. 83–92. IEEE (2006)

    Google Scholar 

  20. Ihaka, R., Gentleman, R.: R: a language for data analysis and graphics. J. Comput. Graph. Stat. 5(3), 299–314 (1996)

    Google Scholar 

  21. Friedman, J., Hastie, T., Tibshirani, R.: The Elements of Statistical Learning. Springer Series in Statistics. Springer, New York (2001)

    MATH  Google Scholar 

Download references

Acknowledgment

This work is supported by the Natural Science Foundation of China (No. 61402321) and the Natural Science Foundation of Tianjin (No. 15JCQNJC00100).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jizeng Wei .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer Science+Business Media Singapore

About this paper

Cite this paper

Peng, H., Wei, J., Guo, W. (2016). Micro-architectural Features for Malware Detection. In: Wu, J., Li, L. (eds) Advanced Computer Architecture. ACA 2016. Communications in Computer and Information Science, vol 626. Springer, Singapore. https://doi.org/10.1007/978-981-10-2209-8_5

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-2209-8_5

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-2208-1

  • Online ISBN: 978-981-10-2209-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics