Classification of Attacks on Embedded Systems

نویسندگان

  • Noura Ouerdi
  • M’hammed Ziane
  • Abdelmalek Azizi
  • Mostafa Azizi
چکیده

The current growth of the number of Embedded Systems (ES) and their use in sensitive systems attract the attention of attackers. They are exposed to real threats and incur significant risks especially when they are involved in specific military or industrial systems. It is important to study the subject from different angles to understand, predict and learn how to protect our products against these attacks. So, evaluators of Embedded Systems (ES) need to organize structure and classify attacks in order to choose the relevant test sets. To do this, we propose a new classification of attacks on Embedded Systems, based on Classification Tree Method (CTM). As a result, thanks to our proposal, we were able to classify the various attacks en Embedded Systems (ES) to generate test cases automatically and usually select the relevant test cases. This allows to properly evaluate Embedded Systems (ES) especially since this type of system is very critical and requires a systematic evaluation.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Side channel parameter characteristics of code injection attacks

Embedded systems are suggestive targets for code injection attacks in the recent years. Software protection mechanisms, and in general computers, are not usually applicable in embedded systems since they have limited resources like memory and process power. In this paper we investigate side channel characteristics of embedded systems and their applicability in code injection attack detection. T...

متن کامل

Intrusion Detection in IOT based Networks Using Double Discriminant Analysis

Intrusion detection is one of the main challenges in wireless systems especially in Internet of things (IOT) based networks. There are various attack types such as probe, denial of service, remote to local and user to root. In addition to known attacks and malicious behaviors, there are various unknown attacks that some of them have similar behavior with respect to each other or mimic the norma...

متن کامل

Differential Power Analysis: A Serious Threat to FPGA Security

Differential Power Analysis (DPA) implies measuring the supply current of a cipher-circuit in an attempt to uncover part of a cipher key. Cryptographic security gets compromised if the current waveforms obtained correlate with those from a hypothetical power model of the circuit. As FPGAs are becoming integral parts of embedded systems and increasingly popular for cryptographic applications and...

متن کامل

Moving dispersion method for statistical anomaly detection in intrusion detection systems

A unified method for statistical anomaly detection in intrusion detection systems is theoretically introduced. It is based on estimating a dispersion measure of numerical or symbolic data on successive moving windows in time and finding the times when a relative change of the dispersion measure is significant. Appropriate dispersion measures, relative differences, moving windows, as well as tec...

متن کامل

Using Internal Sensors and Embedded Detectors for Intrusion Detection

We introduce the concept of using internal sensors to perform intrusion detection in computer systems. We show its practical feasibility and discuss its characteristics and related design and implementation issues. We introduce a classification of data collection mechanisms for intrusion detection systems. At a conceptual level, these mechanisms are classified as direct and indirect monitoring....

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012