Towards Hardware-Based Application Fingerprinting with Microarchitectural Signals for Zero Trust Environments
Towards Hardware-Based Application Fingerprinting with Microarchitectural Signals for Zero Trust Environments
dc.contributor.author | Langehaug, Tor | |
dc.contributor.author | Graham, Scott | |
dc.date.accessioned | 2022-12-27T19:22:57Z | |
dc.date.available | 2022-12-27T19:22:57Z | |
dc.date.issued | 2023-01-03 | |
dc.description.abstract | The interactions between software and hardware are increasingly important to computer system security. This research collects sequences of microprocessor control signals to develop machine learning models that identify software tasks. The proposed approach considers software task identification in hardware as a general problem with attacks treated as a subset of software tasks. Two lines of effort are presented. First, a data collection approach is described to extract sequences of control signals labeled by task identity during real (i.e., non-simulated) system operation. Second, experimental design is used to select hardware and software configuration to train and evaluate machine learning models. The machine learning models significantly outperform a Naive classifier based on Euclidean distances from class means. Various configurations produce balanced accuracy scores between 26.08% and 96.89%. | |
dc.format.extent | 10 | |
dc.identifier.isbn | 978-0-9981331-6-4 | |
dc.identifier.uri | https://hdl.handle.net/10125/103434 | |
dc.language.iso | eng | |
dc.relation.ispartof | Proceedings of the 56th Hawaii International Conference on System Sciences | |
dc.rights | Attribution-NonCommercial-NoDerivatives 4.0 International | |
dc.rights.uri | https://creativecommons.org/licenses/by-nc-nd/4.0/ | |
dc.subject | Cyber Operations, Defense, and Forensics | |
dc.subject | cache attack | |
dc.subject | constant monitoring | |
dc.subject | machine learning | |
dc.subject | microarchitectural data | |
dc.subject | zero trust | |
dc.title | Towards Hardware-Based Application Fingerprinting with Microarchitectural Signals for Zero Trust Environments | |
dc.type.dcmi | text | |
prism.startingpage | 6613 |
Files
Original bundle
1 - 1 of 1
No Thumbnail Available
- Name:
- 0644.pdf
- Size:
- 819.2 KB
- Format:
- Adobe Portable Document Format
- Description: