Authors
John Demme, Matthew Maycock, Jared Schmitz, Adrian Tang, Adam Waksman, Simha Sethumadhavan, Salvatore Stolfo
Publication date
2013/6/23
Journal
ACM SIGARCH computer architecture news
Volume
41
Issue
3
Pages
559-570
Publisher
ACM
Description
The proliferation of computers in any domain is followed by the proliferation of malware in that domain. Systems, including the latest mobile platforms, are laden with viruses, rootkits, spyware, adware and other classes of malware. Despite the existence of anti-virus software, malware threats persist and are growing as there exist a myriad of ways to subvert anti-virus (AV) software. In fact, attackers today exploit bugs in the AV software to break into systems.
In this paper, we examine the feasibility of building a malware detector in hardware using existing performance counters. We find that data from performance counters can be used to identify malware and that our detection techniques are robust to minor variations in malware programs. As a result, after examining a small set of variations within a family of malware on Android ARM and Intel Linux platforms, we can detect many variations within that family. Further …
Total citations
20132014201520162017201820192020202120222023202421628325659787471765635
Scholar articles
J Demme, M Maycock, J Schmitz, A Tang, A Waksman… - ACM SIGARCH computer architecture news, 2013