2022
DOI: 10.1007/978-3-031-22390-7_22
|View full text |Cite
|
Sign up to set email alerts
|

Why We Need a Theory of Maliciousness: Hardware Performance Counters in Security

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
1
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 14 publications
0
1
0
Order By: Relevance
“…Limited dataset: Botacin et al [4] recently discuss about the use of limited dataset to detect microarchitectural attacks and other kind of malwares with ML algorithms. In order to circumvent this issue, we choose to use evasive attacks based on techniques proposed in [27].…”
Section: Discussionmentioning
confidence: 99%
“…Limited dataset: Botacin et al [4] recently discuss about the use of limited dataset to detect microarchitectural attacks and other kind of malwares with ML algorithms. In order to circumvent this issue, we choose to use evasive attacks based on techniques proposed in [27].…”
Section: Discussionmentioning
confidence: 99%
“…Lastly, they illustrated the hardware-based detector's inability to distinguish ransomware embedded in a benign application like Notepad++. In a recent contribution, [55] acknowledged the absence of a perfect malware detector and argued that hardware-based detection is only effective for specific malware types. In particular, [55] propose its effectiveness in identifying attacks exploiting architectural side-effects, citing examples such as RowHammer [56], [57] (detectable through excessive cache flushes [58]), ROP attacks [37] (identified by an abundance of instruction misses [59]), and DirtyCoW [60] (detectable through heightened paging activity).…”
Section: Hardware-based Malware Detectionmentioning
confidence: 99%
“…In a recent contribution, [55] acknowledged the absence of a perfect malware detector and argued that hardware-based detection is only effective for specific malware types. In particular, [55] propose its effectiveness in identifying attacks exploiting architectural side-effects, citing examples such as RowHammer [56], [57] (detectable through excessive cache flushes [58]), ROP attacks [37] (identified by an abundance of instruction misses [59]), and DirtyCoW [60] (detectable through heightened paging activity). The authors also emphasized the necessity for a maliciousness theory to enhance the understanding of malware threats and assess proposed defenses.…”
Section: Hardware-based Malware Detectionmentioning
confidence: 99%