DocumentCode :
2357458
Title :
Observation Mechanism and Cost Model for Tightly Coupled Asymmetric Concurrency
Author :
Seeger, Mark M. ; Wolthusen, Stephen D.
Author_Institution :
Dept. of Secure Services, Center for Adv. Security Res. Darmstadt (CASED), Darmstadt, Germany
fYear :
2010
fDate :
11-16 April 2010
Firstpage :
158
Lastpage :
163
Abstract :
Whilst the precise objectives and mechanisms used by malicious code will vary widely and may involve wholly unknown techniques to achieve their respective objectives, certain second-order operations such as privilege escalation or concealment of the code´s presence or activity are predictable. In particular, concealment mechanisms must modify well-known data structures, which could be detected trivially otherwise. We argue that any such mechanism is necessarily non-atomic and can hence be detected through concurrent observations forcing an interleaved linearization of the malicious code with observations of memory state changes induced in tightly coupled concurrent processing units. Extending previous research for the case of symmetric concurrent observation, we propose a computational model and observation mechanism for the case of tightly coupled asymmetric concurrent processing units as may be found in most current computing environments with particular emphasis on metrics for the cost of forced synchronization and resource contention caused by observations. We argue that the resulting observations will provide a novel sensor datum for intrusion detection but may also be used as a standalone probabilistic detection mechanism particularly suited to detect attacks in progress.
Keywords :
concurrency control; data structures; invasive software; computational model; concealment mechanism; concurrent observations; concurrent processing units; cost model; data structures; forced synchronization; interleaved linearization; malicious code; observation mechanism; privilege escalation; resource contention; second-order operation; tightly coupled asymmetric concurrency; Computational modeling; Computer architecture; Concurrent computing; Costs; Data structures; Information security; Interference; Intrusion detection; Kernel; Monitoring; Asymmetric Concurrency; Computational Model; Intrusion Detection; Memory Observation;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Systems (ICONS), 2010 Fifth International Conference on
Conference_Location :
Menuires
Print_ISBN :
978-1-4244-6231-5
Type :
conf
DOI :
10.1109/ICONS.2010.34
Filename :
5464146
Link To Document :
بازگشت