Anomaly Detection in Embedded Devices Through Hardware Introspection

被引:2
|
作者
Reyes, David Llanio [1 ]
Perez-Pons, Alexander [1 ]
Dean, Rogelio Bofill [1 ]
机构
[1] Florida Int Univ, Coll Engn & Comp, Miami, FL 33199 USA
关键词
anomaly; HIAD; machine learning; JTAG; embedded devices; cyber-attacks; security;
D O I
10.1109/SVCC56964.2023.10165049
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The growth in the number of embedded devices within society has increased and continues to increase significantly throughout the world. The evolution of cyber-physical systems and their availability on the Internet of Things domain has made it possible to incorporate these devices in systems to provide environmental monitoring and status evaluation. The deployment of these devices requires high levels of security to protect their functionality. This includes detecting any potential impact on the devices' integrity, as it can have a negative impact on its performance, functionality, and security. We propose a Hardware Introspection for Anomaly Detection (HIAD) framework that aims to detect abnormal device behavior through machine learning techniques employing processor-level hardware debugging capabilities. Through the JTAG (Joint Test Action Group) interface found in embedded devices, we can extract memory traces and utilize the extracted data to form image representations to train machine learning and deep learning models to detect anomalous execution. HIAD is a powerful tool that can monitor a bare-metal program's execution while minimally impacting performance, and yielding effective identification of execution variations.
引用
收藏
页数:7
相关论文
共 50 条
  • [21] Palisade: A framework for anomaly detection in embedded systems
    Kauffman, Sean
    Dunne, Murray
    Gracioli, Giovani
    Khan, Waleed
    Benann, Nirmal
    Fischmeister, Sebastian
    JOURNAL OF SYSTEMS ARCHITECTURE, 2021, 113
  • [22] Anomaly detection and reasoning with embedded physical model
    Jaw, LC
    Wu, DN
    Bloor, G
    Daumann, A
    2002 IEEE AEROSPACE CONFERENCE PROCEEDINGS, VOLS 1-7, 2002, : 3073 - 3081
  • [23] HARDWARE-AWARE MODEL OPTIMIZATION TOOL FOR EMBEDDED DEVICES
    Ozcinar, Cagri
    Kim, Dongsung
    Duckworth, Benjamin Rufus
    Joya, Shayan
    Di Perto, Nicolas Scotto
    Dusnoki, Attila
    Fabo, Marko
    Vince, Daniel
    Loki, Gabor
    Kiss, Akos
    Alder, Christopher
    2021 IEEE INTERNATIONAL CONFERENCE ON MULTIMEDIA & EXPO WORKSHOPS (ICMEW), 2021,
  • [24] Privacy-preserving MTS anomaly detection for network devices through federated learning
    Zhang, Shenglin
    Xu, Ting
    Zhu, Jun
    Sun, Yongqian
    Jin, Pengxiang
    Shi, Binpeng
    Pei, Dan
    INFORMATION SCIENCES, 2025, 690
  • [25] Anomaly detection through registration
    Chen, M
    Kanade, T
    Pomerleau, D
    Rowley, HA
    PATTERN RECOGNITION, 1999, 32 (01) : 113 - 128
  • [26] Anomaly detection through registration
    Chen, M
    Kanade, T
    Rowley, HA
    Pomerleau, D
    1998 IEEE COMPUTER SOCIETY CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION, PROCEEDINGS, 1998, : 304 - 310
  • [27] AUTOMATED VULNERABILITY DETECTION IN EMBEDDED DEVICES
    Liu, Danjun
    Tang, Yong
    Wang, Baosheng
    Xie, Wei
    Yu, Bo
    ADVANCES IN DIGITAL FORENSICS XIV, 2018, 532 : 313 - 329
  • [28] Fall Detection Method for Embedded Devices
    Ma, Xuepei
    Wang, Xiaohong
    Zhang, Kun
    JOURNAL OF IMAGING SCIENCE AND TECHNOLOGY, 2022, 66 (04)
  • [29] Rootkit Detection on Embedded IoT Devices
    Nagy, Roland
    Nemeth, Krisztian
    Papp, Dorottya
    Buttyan, Levente
    ACTA CYBERNETICA, 2021, 25 (02): : 369 - 400
  • [30] A Hardware/Software Co-Design Approach for Real-Time Object Detection and Tracking on Embedded Devices
    Bui, Casey
    Patel, Nirali
    Patel, Dishant
    Rogers, Samuel
    Sawant, Adarsh
    Manwatkar, Rishiraj
    Tabkhi, Hamed
    IEEE SOUTHEASTCON 2018, 2018,