Exploring ICMetrics to detect abnormal program behaviour on embedded devices

نویسندگان

  • Xiaojun Zhai
  • Kofi Appiah
  • Shoaib Ehsan
  • W. Gareth J. Howells
  • Huosheng Hu
  • Dongbing Gu
  • Klaus D. McDonald-Maier
چکیده

Execution of unknown or malicious software on an embedded system may trigger harmful system behaviour targeted at stealing sensitive data and/or causing damage to the system. It is thus considered a potential and significant threat to the security of embedded systems. Generally, the resource constrained nature of Commercial off-the-shelf (COTS) embedded devices, such as embedded medical equipment, does not allow computationally expensive protection solutions to be deployed on these devices, rendering them vulnerable. A Self-Organising Map (SOM) based and Fuzzy C-means based approaches are proposed in this paper for detecting abnormal program behaviour to boost embedded system security. The presented technique extracts features derived from processor’s Program Counter (PC) and Cycles per Instruction (CPI), and then utilises the features to identify abnormal behaviour using the SOM. Results achieved in our experiment show that the proposed SOM based and Fuzzy Cmeans based methods can identify unknown program behaviours not included in the training set with 90.9% and 98.7% accuracy.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Overview of ICmetrics Technology – Security Infrastructure for Autonomous and Intelligent Healthcare System

Recent developments in bio-, nano-, and digital technology have changed the way modern healthcare systems operate. The provision of healthcare servicing remotely and exploitation of monitoring and assistive technology within and outside medical institutions mean that medical staff and patients constantly interact with various electronic devices. It also means that sensitive patient data are sto...

متن کامل

A Practical Proposal for Ensuring the Provenance of Hardware Devices and Their Safe Operation

This paper presents a novel technique, termed ICmetrics (Integrated Circuit metrics), that can be used for the purposes of generating encryption keys, electronic signatures, detecting attempts of frauds, or preventing malfunction of hardware components and systems. The ICmetrics technology is based on employment of measurable features derived from characteristics of a given electronic device in...

متن کامل

Localized Processing and Analysis of Accelerometer Data in Detecting Traffic Events and Driver Behaviour

Recent advancements in sensor technologies resulted in the development of sensors with small dimensions and with power consumption that is low enough to be embedded in various mobile devices and which is widely integrated in vehicles. Such sensors can be extensively used to detect real-time traffic events and situations of user/vehicle in contextaware mobile applications. This paper explores th...

متن کامل

Early intervention for preschoolers with behaviour problems: Preliminary findings for the Exploring Together Preschool Program

There is increasing recognition of the need for early intervention into behavioural problems in preschool aged children (3-6 years) to prevent long-term adverse outcomes. This paper reports on the Exploring Together Preschool Program (ETPP), an innovative, developmental theory based, early intervention program, aimed at preschoolers referred with behaviour problems who are at risk of developing...

متن کامل

Hardware Fault Attack Detection Methods for Secure Embedded Systems

In our daily life, we are increasingly putting our trust in embedded software applications, which run on a range of processor-based embedded systems from smartcards to pay-TV units. This trend expands the threat model of embedded applications from software into hardware. Over the last 20 years, fault attacks have emerged as an important class of hardware attacks against embedded software securi...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Journal of Systems Architecture - Embedded Systems Design

دوره 61  شماره 

صفحات  -

تاریخ انتشار 2015