Hardware-assisted malware detection for embedded systems

Side-channel attacks (SCAs) have risen to prominence in recent years, due to the advancement of measurement technology and machine learning algorithms. This project aims to detect the presence of such attacks on embedded systems, which have gained relevance with the advent of Internet-of-Things (...

Full description

Saved in:
Bibliographic Details
Main Author: Chua, Penelope Hui Eng
Other Authors: Lam Siew Kei
Format: Final Year Project
Language:English
Published: Nanyang Technological University 2022
Subjects:
Online Access:https://hdl.handle.net/10356/162691
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Nanyang Technological University
Language: English
id sg-ntu-dr.10356-162691
record_format dspace
spelling sg-ntu-dr.10356-1626912022-11-07T05:33:30Z Hardware-assisted malware detection for embedded systems Chua, Penelope Hui Eng Lam Siew Kei School of Computer Science and Engineering ASSKLam@ntu.edu.sg Engineering::Computer science and engineering::Hardware::Register-transfer-level implementation Side-channel attacks (SCAs) have risen to prominence in recent years, due to the advancement of measurement technology and machine learning algorithms. This project aims to detect the presence of such attacks on embedded systems, which have gained relevance with the advent of Internet-of-Things (IOT) technology, by analysing hardware-level behavioural changes through the inspection of in-built Hardware Performance Counters (HPCs). In this report, the configuration of a Flush+Reload cache-based side-channel attack was conducted on an ARM device through ARMageddon, with data collection of the HPCs done through the perf command line utility on Linux to characterise system behaviour under both normal and attacked states. Feature analysis and selection were conducted to isolate the relevant affected events, and machine learning approaches such as Neural Networks and XGBoost were used to predict the compromise of a system. Relevant HPCs in side-channel attack detection were found to mainly fall under hardware events and hardware-cache events, while software events remained largely unaffected. High model accuracies for XGBoost (99.99%) and Decision Trees (99.96%) were attained, indicating the feasibility of implementing a lightweight and accurate solution for real-time detection in future studies. Keywords: Side-channel Attacks, Micro-architectural Events, Hardware Performance Counters, Embedded Systems, Flush+Reload Bachelor of Engineering Science (Computer Science) 2022-11-07T05:33:30Z 2022-11-07T05:33:30Z 2022 Final Year Project (FYP) Chua, P. H. E. (2022). Hardware-assisted malware detection for embedded systems. Final Year Project (FYP), Nanyang Technological University, Singapore. https://hdl.handle.net/10356/162691 https://hdl.handle.net/10356/162691 en SCSE21-0702 application/pdf Nanyang Technological University
institution Nanyang Technological University
building NTU Library
continent Asia
country Singapore
Singapore
content_provider NTU Library
collection DR-NTU
language English
topic Engineering::Computer science and engineering::Hardware::Register-transfer-level implementation
spellingShingle Engineering::Computer science and engineering::Hardware::Register-transfer-level implementation
Chua, Penelope Hui Eng
Hardware-assisted malware detection for embedded systems
description Side-channel attacks (SCAs) have risen to prominence in recent years, due to the advancement of measurement technology and machine learning algorithms. This project aims to detect the presence of such attacks on embedded systems, which have gained relevance with the advent of Internet-of-Things (IOT) technology, by analysing hardware-level behavioural changes through the inspection of in-built Hardware Performance Counters (HPCs). In this report, the configuration of a Flush+Reload cache-based side-channel attack was conducted on an ARM device through ARMageddon, with data collection of the HPCs done through the perf command line utility on Linux to characterise system behaviour under both normal and attacked states. Feature analysis and selection were conducted to isolate the relevant affected events, and machine learning approaches such as Neural Networks and XGBoost were used to predict the compromise of a system. Relevant HPCs in side-channel attack detection were found to mainly fall under hardware events and hardware-cache events, while software events remained largely unaffected. High model accuracies for XGBoost (99.99%) and Decision Trees (99.96%) were attained, indicating the feasibility of implementing a lightweight and accurate solution for real-time detection in future studies. Keywords: Side-channel Attacks, Micro-architectural Events, Hardware Performance Counters, Embedded Systems, Flush+Reload
author2 Lam Siew Kei
author_facet Lam Siew Kei
Chua, Penelope Hui Eng
format Final Year Project
author Chua, Penelope Hui Eng
author_sort Chua, Penelope Hui Eng
title Hardware-assisted malware detection for embedded systems
title_short Hardware-assisted malware detection for embedded systems
title_full Hardware-assisted malware detection for embedded systems
title_fullStr Hardware-assisted malware detection for embedded systems
title_full_unstemmed Hardware-assisted malware detection for embedded systems
title_sort hardware-assisted malware detection for embedded systems
publisher Nanyang Technological University
publishDate 2022
url https://hdl.handle.net/10356/162691
_version_ 1749179196901425152