Title :
HPCMalHunter: Behavioral malware detection using hardware performance counters and singular value decomposition
Author :
Bahador, Mohammad Bagher ; Abadi, Mahdi ; Tajoddin, Asghar
Author_Institution :
Fac. of Electr. & Comput. Eng., Tarbiat Modares Univ. Tehran, Tehran, Iran
Abstract :
Malicious programs, also known as malware, often use code obfuscation techniques to make static analysis more difficult and to evade signature-based detection. To resolve this problem, various behavioral detection techniques have been proposed that focus on the run-time behaviors of programs in order to dynamically detect malicious ones. Most of these techniques describe the run-time behavior of a program on the basis of its data flow and/or its system call traces. Recent work in behavioral malware detection has shown promise in using hardware performance counters (HPCs), which are a set of special-purpose registers built into modern processors providing detailed information about hardware and software events. In this paper, we pursue this line of research by presenting HPCMalHunter, a novel approach for real-time behavioral malware detection. HPCMalHunter uses HPCs to collect a set of event vectors from the beginning of a program´s execution. It also uses the singular value decomposition (SVD) to reduce these event vectors and generate a behavioral vector for the program. By applying support vector machines (SVMs) to the feature vectors of different programs, it is able to identify malicious programs in real-time. Our results of experiments show that HPCMalHunter can detect malicious programs at the beginning of their execution with a high detection rate and a low false alarm rate.
Keywords :
invasive software; program diagnostics; singular value decomposition; support vector machines; HPCMalHunter; SVD; SVM; behavioral detection techniques; behavioral malware detection; behavioral vector; code obfuscation techniques; false alarm rate; feature vectors; hardware performance counters; malicious programs; real-time behavioral malware detection; signature-based detection; singular value decomposition; static analysis; support vector machines; system call traces; Hardware; Malware; Matrix decomposition; Radiation detectors; Real-time systems; Support vector machines; Vectors; behavioral malware detection; hardware performance counter; hardware-level detection; real-time detection; singular value decomposition;
Conference_Titel :
Computer and Knowledge Engineering (ICCKE), 2014 4th International eConference on
Conference_Location :
Mashhad
Print_ISBN :
978-1-4799-5486-5
DOI :
10.1109/ICCKE.2014.6993402