Researchers from North Carolina State University and the University of Texas at Austin have developed a technique for detecting types of malware that use a system’s architecture to thwart traditional security measures. The new detection approach works by tracking power fluctuations in embedded systems.
“Embedded systems are basically any computer that doesn’t have a physical keyboard – from smartphones to Internet of Things devices,” says Aydin Aysu, co-author of a paper on the work and an assistant professor of electrical and computer engineering at NC State. “Embedded systems are used in everything from the voice-activated virtual assistants in our homes to industrial control systems like those used in power plants. And malware that targets those systems can be used to seize control of these systems or to steal information.”
At issue are so-called micro-architectural attacks. This form of malware makes use of a system’s architectural design, effectively hijacking the hardware in a way that gives outside users control of the system and access to its data. Spectre and Meltdown are high-profile examples of micro-architectural malware.
“The nature of micro-architectural attacks makes them very difficult to detect – but we have found a way to detect them,” Aysu says. “We have a good idea of what power consumption looks like when embedded systems are operating normally. By looking for anomalies in power consumption, we can tell that there is malware in a system – even if we can’t identify the malware directly.”
The power-monitoring solution can be incorporated into smart batteries for use with new embedded systems technologies. New “plug and play” hardware would be needed to apply the detection tool with existing embedded systems.
There is one other limitation: the new detection technique relies on an embedded system’s power reporting. In lab testing, researchers found that – in some instances – the power monitoring detection tool could be fooled if the malware modifies its activity to mimic “normal” power usage patterns.
“However, even in these instances our technique provides an advantage,” Aysu says. “We found that the effort required to mimic normal power consumption and evade detection forced malware to slow down its data transfer rate by between 86 and 97 percent. In short, our approach can still reduce the effects of malware, even in those few instances where the malware is not detected.
“This paper demonstrates a proof of concept. We think it offers an exciting new approach for addressing a widespread security challenge.”
The Latest on: Malware
via Google News
The Latest on: Malware
- Criminals use coronavirus fears to launch ‘theft malware’ says analyston February 1, 2020 at 2:42 pm
Criminals are taking advantage of the coronavirus outbreak according to analyst firm GlobalData which has revealed the spread of new malware by criminals raising fears about the disease.
- Hackers using coronavirus scare to spread Emotet malware in Japanon February 1, 2020 at 11:26 am
Cybercriminals are using global fears about the virus to spread the Emotet trojan. Researchers with IBM X-Force and Kaspersky have discovered that cybercriminals are spreading a popular malware strain ...
- eSkimming Malware Attacks On The Riseon January 31, 2020 at 12:53 pm
The FBI says it has been monitoring eSkimming for almost seven years. However, the crime is growing as scammers are becoming more advanced and sharing the malware through the web. Herb Stapleton, ...
- One of the largest data leaks ever traced back to Wawa's 2019 malware attackon January 31, 2020 at 6:13 am
The Wawa breach may rank as one of the biggest of all time, comparable to earlier Home Depot and Target breaches.
- Microsoft finds crypto mining malware in late Kobe Bryant’s wallpaperon January 31, 2020 at 12:44 am
A cryptocurrency mining malware has been found in a wallpaper of late basketball legend Kobe Bryant.The post Microsoft finds crypto mining malware in late Kobe Bryant's wallpaper appeared first on The ...
- New Coronavirus Strain? Nope, Just Hackers Trying to Spread Malwareon January 30, 2020 at 6:22 pm
The hackers have been using files and emails that warn about a new coronavirus strain to trick users into opening them. Doing so can secretly deliver malware to the victim's machine.
- An AI Virus Warning System, Mac Malware, and More Newson January 27, 2020 at 10:51 am
Artificial intelligence is alerting and Mac malware is diverting, but first: a cartoon about baby privacy. Here's the news you need to know, in two minutes or less. On January 9, the World Health ...
- Malware: Hacking campaign linked to Iranon January 27, 2020 at 3:04 am
Researchers at Recorded Future have linked trojan malware intrusions and espionage to a state-backed hacking operation working out of Iran.
- The Sneaky Simple Malware That Hits Millions of Macson January 25, 2020 at 4:10 am
But it’s still surprising that the most prolific malware on macOS—by one count, affecting one in 10 devices—is so relatively crude. This week, antivirus company Kaspersky detailed the 10 most common ...
- Hidden Mac Threat—This Is The Sneaky Malware Most Likely To Infect Youon January 25, 2020 at 1:32 am
30% of all Mac malware infections are for one particular malware. This is how it works and what you should do.
via Bing News