Anomaly Detection in Embedded Devices Through Hardware Introspection

被引:2
|
作者
Reyes, David Llanio [1 ]
Perez-Pons, Alexander [1 ]
Dean, Rogelio Bofill [1 ]
机构
[1] Florida Int Univ, Coll Engn & Comp, Miami, FL 33199 USA
关键词
anomaly; HIAD; machine learning; JTAG; embedded devices; cyber-attacks; security;
D O I
10.1109/SVCC56964.2023.10165049
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The growth in the number of embedded devices within society has increased and continues to increase significantly throughout the world. The evolution of cyber-physical systems and their availability on the Internet of Things domain has made it possible to incorporate these devices in systems to provide environmental monitoring and status evaluation. The deployment of these devices requires high levels of security to protect their functionality. This includes detecting any potential impact on the devices' integrity, as it can have a negative impact on its performance, functionality, and security. We propose a Hardware Introspection for Anomaly Detection (HIAD) framework that aims to detect abnormal device behavior through machine learning techniques employing processor-level hardware debugging capabilities. Through the JTAG (Joint Test Action Group) interface found in embedded devices, we can extract memory traces and utilize the extracted data to form image representations to train machine learning and deep learning models to detect anomalous execution. HIAD is a powerful tool that can monitor a bare-metal program's execution while minimally impacting performance, and yielding effective identification of execution variations.
引用
收藏
页数:7
相关论文
共 50 条
  • [1] Hardware Performance Counters for Embedded Software Anomaly Detection
    Ott, Karl
    Mahapatra, Rabi
    2018 16TH IEEE INT CONF ON DEPENDABLE, AUTONOM AND SECURE COMP, 16TH IEEE INT CONF ON PERVAS INTELLIGENCE AND COMP, 4TH IEEE INT CONF ON BIG DATA INTELLIGENCE AND COMP, 3RD IEEE CYBER SCI AND TECHNOL CONGRESS (DASC/PICOM/DATACOM/CYBERSCITECH), 2018, : 528 - 535
  • [2] Formal Detection Method for Hardware Vulnerabilities and Trojan of Embedded Devices
    Xie Xiaodong
    Li Qingbao
    Niu Xiaopeng
    INTERNATIONAL CONFERENCE ON GRAPHIC AND IMAGE PROCESSING (ICGIP 2012), 2013, 8768
  • [3] Anomaly Detection Trusted Hardware Sensors for Critical Infrastructure Legacy Devices
    Fournaris, Apostolos P.
    Dimopoulos, Charis
    Lampropoulos, Konstantinos
    Koufopavlou, Odysseas
    SENSORS, 2020, 20 (11)
  • [4] Syndrome: Spectral Analysis for Anomaly Detection on Medical IoT and Embedded Devices
    Sehatbakhsh, Nader
    Alum, Monjur
    Nazari, Alireza
    Zajic, Alenka
    Prvulovic, Milos
    PROCEEDINGS OF THE 2018 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE ORIENTED SECURITY AND TRUST (HOST), 2018, : 1 - 8
  • [5] Embedded hardware face detection
    Theocharides, T
    Link, G
    Vijaykrishnan, N
    Irwin, MJ
    Wolf, W
    17TH INTERNATIONAL CONFERENCE ON VLSI DESIGN, PROCEEDINGS: DESIGN METHODOLOGIES FOR THE GIGASCALE ERA, 2004, : 133 - 138
  • [6] Virtual Machine Introspection for Anomaly-Based Keylogger Detection
    Huseynov, Huseyn
    Kourai, Kenichi
    Saadawi, Tarek
    Igbe, Obinna
    2020 IEEE 21ST INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE SWITCHING AND ROUTING (IEEE HPSR), 2020,
  • [7] Anomaly detection in embedded systems
    Maxion, RA
    Tan, KMC
    IEEE TRANSACTIONS ON COMPUTERS, 2002, 51 (02) : 108 - 120
  • [8] Interfacing hardware devices to embedded Java']Java
    Ludwich, Mateus Krepsky
    Frohlich, Antonio Augusto
    2011 BRAZILIAN SYMPOSIUM ON COMPUTING SYSTEM ENGINEERING (SBESC), 2011, : 176 - 181
  • [9] Design and Hardware Implementation of Embedded Controller Devices
    Ben Othman, Slim
    Ben Saoud, Slim
    AFRICAN REVIEW OF PHYSICS, 2008, 2 : 7 - 9
  • [10] Hardware-Performance-Counters-based anomaly detection in massively deployed smart industrial devices
    Bourdon, Malcolm
    Gimenez, Pierre-Francois
    Alata, Eric
    Kaaniche, Mohamed
    Migliore, Vincent
    Nicomette, Vincent
    Laarouchi, Youssef
    2020 IEEE 19TH INTERNATIONAL SYMPOSIUM ON NETWORK COMPUTING AND APPLICATIONS (NCA), 2020,