Hardware-based Detection of Malicious Firmware Modification in Microgrids

被引:0
|
作者
Srivastava, Amisha [1 ]
Thakur, Sneha
Kuruvila, Abraham Peedikayil [2 ]
Balsara, Poras T. [1 ]
Basu, Kanad [1 ]
机构
[1] Univ Texas Dallas, Richardson, TX 75080 USA
[2] Samsung Elect Amer, Ridgefield Pk, NJ USA
关键词
Hardware Performance Counters; Microgrids; Time Series Classification; Digital Signal Processing;
D O I
10.1109/VLSID60093.2024.00037
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Microgrids play a pivotal role in shaping the future of sustainable and resilient energy solutions. However, their remote accessibility and control functionalities make them susceptible to cybersecurity threats. In particular, components such as Digital Signal Processing (DSP) Boards deployed in Microgrids are prime targets for cyber adversaries seeking to compromise the integrity and functionality of power systems. To address this threat, we propose a comprehensive methodology that integrates custom-built Hardware Performance Counters (HPCs) with Time Series Classifiers (TSCs) to efficiently detect malicious firmware in critical components operating within a Microgrid setup. Our experimental results demonstrate the effectiveness of the proposed approach, achieving up to 100% accuracy in detecting firmware modification attacks. This method represents a significant stride in the Design-for-Security (DfS) paradigm, bolstering the resilience of microgrids against cyber threats and safeguarding critical infrastructure.
引用
收藏
页码:186 / 191
页数:6
相关论文
共 50 条
  • [21] Capacitance Measurement of Running Hardware Devices and its Application to Malicious Modification Detection
    Nishizawa, Makoto
    Hasegawa, Kento
    Togawa, Nozomu
    2018 IEEE ASIA PACIFIC CONFERENCE ON CIRCUITS AND SYSTEMS (APCCAS 2018), 2018, : 362 - 365
  • [22] Time series-based detection and impact analysis of firmware attacks in microgrids
    Zografopoulos, Ioannis
    Kuruvila, Abraham Peedikayil
    Basu, Kanad
    Konstantinou, Charalambos
    ENERGY REPORTS, 2022, 8 : 11221 - 11234
  • [23] Virtualization and hardware-based security
    Perez, Ronald
    Sailer, Reiner
    van Doorn, Leendert
    IEEE SECURITY & PRIVACY, 2008, 6 (05) : 24 - 31
  • [24] Hardware-based Cyber Threats
    Alves, Thiago
    Morris, Thomas
    ICISSP: PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2018, : 259 - 266
  • [25] Fingerprint-Based Detection and Diagnosis of Malicious Programs in Hardware
    Liu, Bao
    Sandhu, Ravi
    IEEE TRANSACTIONS ON RELIABILITY, 2015, 64 (03) : 1068 - 1077
  • [26] A Hardware-Based Approach for Fault Detection in RTOS-Based Embedded Systems
    Silva, D.
    Stangherlin, K.
    Bolzani, L.
    Vargas, F.
    2011 16TH IEEE EUROPEAN TEST SYMPOSIUM (ETS), 2011, : 209 - 209
  • [27] HPCgnature: a hardware-based application-level intrusion detection system
    Musavi, Seyyedeh Atefeh
    Hashemi, Mahmoud Reza
    IET INFORMATION SECURITY, 2019, 13 (01) : 19 - 26
  • [28] Algorithms for hardware-based pattern recognition
    Lohweg, Volker
    Diederichs, Carsten
    Müller, Dietmar
    Eurasip Journal on Applied Signal Processing, 2004, 2004 (12): : 1912 - 1920
  • [29] Flexible Hardware-Based Stereo Matching
    Ambrosch, Kristian
    Kubinger, Wilfried
    Humenberger, Martin
    Steininger, Andreas
    EURASIP JOURNAL ON EMBEDDED SYSTEMS, 2008, (01)
  • [30] Hardware-based networking widens the pipes
    Ortiz, S
    COMPUTER, 1998, 31 (05) : 8 - 9