Title :
Using Existing Hardware Services for Malware Detection
Abstract :
The paper is divided into two sections. First, we describe our experiments in using hardware-based metrics such as those collected by the BPU and MMU for detection of malware activity at runtime. Second, we sketch a defense-in-depth security model that combines such detection with hardware-aided proof-carrying code and input validation.
Keywords :
invasive software; defense-in-depth security model; hardware-aided proof-carrying code; hardware-based metrics; input validation; malware activity detection; Hardware; IP networks; Malware; Monitoring; Software; System-on-chip; data security; malware; security in hardware;
Conference_Titel :
Security and Privacy Workshops (SPW), 2014 IEEE
Conference_Location :
San Jose, CA
DOI :
10.1109/SPW.2014.49