Profiling with trust
- Large-scale attacks on IoT and edge computing devices pose a significant threat. As a prominent example, Mirai is an IoT botnet with 600,000 infected devices around the globe, capable of conducting effective and targeted DDoS attacks on (critical) infrastructure. Driven by the substantial impacts of attacks, manufacturers and system integrators propose Trusted Execution Environments (TEEs) that have gained significant importance recently. TEEs offer an execution environment to run small portions of code isolated from the rest of the system, even if the operating system is compromised. In this publication, we examine TEEs in the context of system monitoring and introduce the Trusted Monitor (TM), a novel anomaly detection system that runs within a TEE. The TM continuously profiles the system using hardware performance counters and utilizes an application-specific machine-learning model for anomaly detection. In our evaluation, we demonstrate that the TM accurately classifies 86% of 183 tested workloads, with an overhead of less than 2%. Notably, we show that a real-world kernel-level rootkit has observable effects on performance counters, allowing the TM to detect it. Major parts of the TM are implemented in the Rust programming language, eliminating common security-critical programming errors.
Author: | Christian EichlerGND, Jonas RöcklGND, Benedikt JungGND, Ralph SchlenkGND, Tilo MüllerGND, Timo HönigGND |
---|---|
URN: | urn:nbn:de:hbz:294-111375 |
DOI: | https://doi.org/10.1007/s10617-024-09283-1 |
Parent Title (English): | Design automation for embedded systems |
Subtitle (English): | system monitoring from trusted execution environments |
Publisher: | Springer Science + Business Media B.V. |
Place of publication: | Dordrecht |
Document Type: | Article |
Language: | English |
Date of Publication (online): | 2024/06/07 |
Date of first Publication: | 2024/02/16 |
Publishing Institution: | Ruhr-Universität Bochum, Universitätsbibliothek |
Tag: | Anomaly detection; Hardware performance counter; Machine learning; Malware detection; Rust; Trusted execution environment |
Volume: | 28 |
First Page: | 23 |
Last Page: | 44 |
Note: | Dieser Beitrag ist auf Grund des DEAL-Springer-Vertrages frei zugänglich. |
Dewey Decimal Classification: | Allgemeines, Informatik, Informationswissenschaft / Informatik |
open_access (DINI-Set): | open_access |
faculties: | Fakultät für Informatik |
Licence (English): | Creative Commons - CC BY 4.0 - Attribution 4.0 International |