Adversarial Evasion-Resilient Hardware Malware Detectors

Slides:



Advertisements
Similar presentations
My name is Dustin Boswell and I will be presenting: Ensemble Methods in Machine Learning by Thomas G. Dietterich Oregon State University, Corvallis, Oregon.
Advertisements

On the Hardness of Evading Combinations of Linear Classifiers Daniel Lowd University of Oregon Joint work with David Stevens.
Logistic Regression Principal Component Analysis Sampling TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: AAAA A A A.
On Appropriate Assumptions to Mine Data Streams: Analyses and Solutions Jing Gao† Wei Fan‡ Jiawei Han† †University of Illinois at Urbana-Champaign ‡IBM.
Neural Networks Part 4 Dan Simon Cleveland State University 1.
Lazy Learning k-Nearest Neighbour Motivation: availability of large amounts of processing power improves our ability to tune k-NN classifiers.
Walter Hop Web-shop Order Prediction Using Machine Learning Master’s Thesis Computational Economics.
Meltem Ozsoy*, Caleb Donovick*, Iakov Gorelik*,
Man vs. Machine: Adversarial Detection of Malicious Crowdsourcing Workers Gang Wang, Tianyi Wang, Haitao Zheng, Ben Y. Zhao, UC Santa Barbara, Usenix Security.
Rotation Invariant Neural-Network Based Face Detection
Introduction to machine learning and data mining 1 iCSC2014, Juan López González, University of Oviedo Introduction to machine learning Juan López González.
LOGO Ensemble Learning Lecturer: Dr. Bo Yuan
Benk Erika Kelemen Zsolt
Combining multiple learners Usman Roshan. Bagging Randomly sample training data Determine classifier C i on sampled data Goto step 1 and repeat m times.
Exploiting Context Analysis for Combining Multiple Entity Resolution Systems -Ramu Bandaru Zhaoqi Chen Dmitri V.kalashnikov Sharad Mehrotra.
Ensemble Methods: Bagging and Boosting
Ensemble Learning Spring 2009 Ben-Gurion University of the Negev.
1 Diversifying Sensors to Improve Network Resilience Wenliang (Kevin) Du Electrical Engineering & Computer Science Syracuse University.
School of Engineering and Computer Science Victoria University of Wellington Copyright: Peter Andreae, VUW Image Recognition COMP # 18.
Ensemble Learning for Low-level Hardware-supported Malware Detection
A Brief Introduction and Issues on the Classification Problem Jin Mao Postdoc, School of Information, University of Arizona Sept 18, 2015.
Support-Vector Networks C Cortes and V Vapnik (Tue) Computational Models of Intelligence Joon Shik Kim.
Machine Learning: A Brief Introduction Fu Chang Institute of Information Science Academia Sinica ext. 1819
Technische Universität München Yulia Gembarzhevskaya LARGE-SCALE MALWARE CLASSIFICATON USING RANDOM PROJECTIONS AND NEURAL NETWORKS Technische Universität.
Unveiling Zeus Automated Classification of Malware Samples Abedelaziz Mohaisen Omar Alrawi Verisign Inc, VA, USA Verisign Labs, VA, USA
Combining Models Foundations of Algorithms and Machine Learning (CS60020), IIT KGP, 2017: Indrajit Bhattacharya.
Hardware based Intrusion Detection
Semi-Supervised Clustering
Stealing Machine Learning Models via Prediction APIs
Trees, bagging, boosting, and stacking
Table 1. Advantages and Disadvantages of Traditional DM/ML Methods
Pfizer HTS Machine Learning Algorithms: November 2002
The Elements of Statistical Learning
Source: Procedia Computer Science(2015)70:
Active Learning Intrusion Detection using k-Means Clustering Selection
Announcements HW4 due today (11:59pm) HW5 out today (due 11/17 11:59pm)
Classification with Perceptrons Reading:
COMP61011 : Machine Learning Ensemble Models
Basic machine learning background with Python scikit-learn
Poisoning Attacks with Back-Gradient Optimization
Schizophrenia Classification Using
AI in Cyber-security: Examples of Algorithms & Techniques
Machine Learning Week 1.
A Tutorial on HOG Human Detection
Students: Meiling He Advisor: Prof. Brain Armstrong
Perceptrons for Dummies
Mixture Density Networks
Categorization by Learning and Combing Object Parts
Bolun Wang*, Yuanshun Yao, Bimal Viswanath§ Haitao Zheng, Ben Y. Zhao
Logistic Regression & Parallel SGD
Soft Error Detection for Iterative Applications Using Offline Training
Lecture 18: Bagging and Boosting
Word Embedding Word2Vec.
RHMD: Evasion-Resilient Hardware Malware Detectors
The use of Neural Networks to schedule flow-shop with dynamic job arrival ‘A Multi-Neural Network Learning for lot Sizing and Sequencing on a Flow-Shop’
Pattern Recognition & Machine Learning
Binghui Wang, Le Zhang, Neil Zhenqiang Gong
CSSE463: Image Recognition Day 13
Lecture 06: Bagging and Boosting
Model Combination.
Overview of deep learning
Image Classification & Training of Neural Networks
Junheng, Shengming, Yunsheng 11/09/2018
Enabling Dynamic Network Access Control with Anomaly-based IDS and SDN
Rohan Yadav and Charles Yuan (rohany) (chenhuiy)
Modeling IDS using hybrid intelligent systems
Image recognition.
Machine Learning.
Advisor: Dr.vahidipour Zahra salimian Shaghayegh jalali Dec 2017
Outlines Introduction & Objectives Methodology & Workflow
Presentation transcript:

Adversarial Evasion-Resilient Hardware Malware Detectors Nael Abu-Ghazaleh Joint work with Khaled Khasawneh, Dmitry Ponomarev and Lei Yu

Malware is Everywhere!

Over 250,000 malware registered every day! Malware is Everywhere! Over 250,000 malware registered every day!

Hardware Malware Detectors (HMDs) Use Machine Learning: detect malware as computational anomaly Use low-level features collected from the hardware Can be always-on without adding performance overhead Many research papers including ISCA’13, HPCA’15 and MICRO’16

Can malware evade detection? Overview Can malware evade detection? Evade detection after re-training Develop evasive malware Reverse-engineer HMDs

Can malware evade detection? Can we make HMDs robust to evasion? Overview Can malware evade detection? If yes Can we make HMDs robust to evasion? Evade detection after re-training Develop evasive malware Reverse-engineer HMDs Yes! using RHMD 1- Provably harder to reverse-engineer 2- Robust to evasion

Reverse Engineering

How to Reverse Engineer HMDs? Challenges: We don’t know the detection period We don’t know the features used We don’t know the detection algorithm Approach: Train different classifiers Derive specific parameters as an optimization problem

Reverse Engineering HMDs Attacker Training Data _________________________

Reverse Engineering HMDs Victim HMD Attacker Training Data _________________________ 10100 Black box output

Reverse Engineering HMDs Victim HMD Attacker Training Data _________________________ 10100 Black box output Training model Data Labels

Reverse Engineering HMDs Victim HMD Attacker Training Data _________________________ 10100 Black box output Training model Data Labels Reverse-engineered HMD

We Can Guess Detectors Parameters! Victim HMD parameters: - 10K detection period - Instructions features vector

We Can Guess Detectors Parameters! Victim HMD parameters: - 10K detection period - Instructions features vector Guessing detection period: LR: Logistic Regression DT: Decision Tree SVM: Support Vector Machines

We Can Guess Detectors Parameters! Victim HMD parameters: - 10K detection period - Instructions features vector Guessing feature vector: LR: Logistic Regression DT: Decision Tree SVM: Support Vector Machines

Reverse Engineering Effectiveness Logistic Regression Victim HMD Neural Networks

Reverse Engineering Effectiveness Current generation of HMDs can be reverse engineered Logistic Regression Neural Networks

Evading HMDs

How to Create Evasive Malware? Challenges: - We don’t have malware source code - We can’t decompile malware because its obfuscated Our approach: PIN Dynamic Control Flow Graph

What we Should Add to Evade? Logistic Regression (LR) LR is defined by a weight vector θ Add instructions whose weights are negative

What we Should Add to Evade? Neural Network (NN) Collapse the description of the NN into a single vector Add instructions whose weights are negative

What we Should Add to Evade? Current generation of HMDs are vulnerable to evasion attacks! Neural Network (NN) Collapse the description of the NN into a single vector Add instructions whose weights are negative

Does re-training Help?

Can we Retrain with Samples of Evasive Malware? Linear Model (LR)

Can we Retrain with Samples of Evasive Malware? Linear Model (LR) Non-Linear Model (NN)

Explaining Retraining Performance Linear Model (LR)

Explaining Retraining Performance Non-Linear Model (NN)

What if we Keep Retraining?

What if we Keep Retraining?

What if we Keep Retraining?

What if we Keep Retraining?

What if we Keep Retraining? Re-training is not a general solution

Can we Build Detectors that Resist Evasion?

Overview of RHMDs RHMD HMD 1 HMD 2 Pool of diverse HMDs . HMD n

Overview of RHMDs RHMD HMD 1 HMD 2 Input Output . HMD n Selector

Overview of RHMDs … RHMD . Features vector Input Output Detection period Number of committed instructions … Features vector RHMD HMD 1 HMD 2 Input Output . HMD n Selector

Overview of RHMDs … … RHMD . Features vector Input Output Detection period Number of committed instructions … … Features vector RHMD HMD 1 HMD 2 Input Output . HMD n Selector

Overview of RHMDs … … … RHMD . Features vector Input Output Detection period Number of committed instructions … … … Features vector RHMD HMD 1 HMD 2 Input Output . HMD n Selector

Overview of RHMDs … … … RHMD Diversify by Different: 1- Features Detection period Number of committed instructions … … … Features vector RHMD Diversify by Different: 1- Features 2- Detection periods HMD 1 HMD 2 . HMD n Selector

Reverse Engineer RHMDs Randomizing the features 2 feature vectors 3 feature vectors

Reverse Engineer RHMDs Randomizing the features & detection period 2 feature vectors & 2 periods 3 feature vectors & 2 periods

RHMD is Resilient to Evasion

Hardware Overhead FPGA prototype on open core (AO486): RHMD with three detectors: Area increase 1.72% Power increase 0.78%

Transferability Given an evasive malware crafted to evade Detector A how likely would it evade Detector B Detector A Target Craft evasive malware How likely it will evade? Detector B

Impact on RHMDs? RHMD resilient to black-box attacks Making reverse engineering is not accurate Transferability help understanding resilience to White-box attack: attacker knows some/all base detectors Gray-box attacks: attacker has access to training data

Intra-algorithm Transferability

Cross-algorithm Transferability

Combined Transferability

Final thoughts Machine learning will be prevalent in systems Already used in a number of predictors Especially true as systems and applications continue to evolve Important to understand implications and design for resilience against adversarial attacks

RAID 2015 – Kyoto, Japan, November 2015 Thank you! Questions? RAID 2015 – Kyoto, Japan, November 2015

Can’t Just Randomly Add Instructions

Evasion Overhead