Anomaly Detection in Embedded Devices Through Hardware Introspection

被引:2
|
作者
Reyes, David Llanio [1 ]
Perez-Pons, Alexander [1 ]
Dean, Rogelio Bofill [1 ]
机构
[1] Florida Int Univ, Coll Engn & Comp, Miami, FL 33199 USA
关键词
anomaly; HIAD; machine learning; JTAG; embedded devices; cyber-attacks; security;
D O I
10.1109/SVCC56964.2023.10165049
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The growth in the number of embedded devices within society has increased and continues to increase significantly throughout the world. The evolution of cyber-physical systems and their availability on the Internet of Things domain has made it possible to incorporate these devices in systems to provide environmental monitoring and status evaluation. The deployment of these devices requires high levels of security to protect their functionality. This includes detecting any potential impact on the devices' integrity, as it can have a negative impact on its performance, functionality, and security. We propose a Hardware Introspection for Anomaly Detection (HIAD) framework that aims to detect abnormal device behavior through machine learning techniques employing processor-level hardware debugging capabilities. Through the JTAG (Joint Test Action Group) interface found in embedded devices, we can extract memory traces and utilize the extracted data to form image representations to train machine learning and deep learning models to detect anomalous execution. HIAD is a powerful tool that can monitor a bare-metal program's execution while minimally impacting performance, and yielding effective identification of execution variations.
引用
收藏
页数:7
相关论文
共 50 条
  • [31] Anomaly Detection for Mobile Devices in Industrial Internet
    Ma, Ge
    Gu, Weixi
    Huang, Qiyang
    Zhu, Guowei
    Lv, Kan
    Li, Yujia
    UBICOMP/ISWC '20 ADJUNCT: PROCEEDINGS OF THE 2020 ACM INTERNATIONAL JOINT CONFERENCE ON PERVASIVE AND UBIQUITOUS COMPUTING AND PROCEEDINGS OF THE 2020 ACM INTERNATIONAL SYMPOSIUM ON WEARABLE COMPUTERS, 2020, : 75 - 77
  • [32] SecMon: A Secure Introspection Framework for Hardware Virtualization
    Wu, Xiaolong
    Gao, Yunwei
    Tian, Xinhui
    Song, Ying
    Guo, Bing
    Feng, Baiming
    Sun, Yuzhong
    PROCEEDINGS OF THE 2013 21ST EUROMICRO INTERNATIONAL CONFERENCE ON PARALLEL, DISTRIBUTED, AND NETWORK-BASED PROCESSING, 2013, : 282 - 286
  • [33] A Novel Hardware Accelerator for Embedded Object Detection Applications
    Watson, David
    Morison, Gordon
    Ahmadinia, Ali
    Buggy, Tom
    IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING, 2017, 5 (04) : 551 - 562
  • [34] Granularity and detection capability of an adaptive embedded Hardware Trojan detection system
    Lecomte, Maxime
    Fournier, Jacques J. A.
    Maurine, Philippe
    PROCEEDINGS OF THE 2016 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE ORIENTED SECURITY AND TRUST (HOST), 2016, : 135 - 138
  • [35] Hardware Fingerprint Authentication in Optical Networks Assisted by Anomaly Detection
    Kang, Linjiao
    Zhang, Liuming
    Huang, Xinran
    Hu, Weisheng
    Yang, Xuelin
    IEEE PHOTONICS TECHNOLOGY LETTERS, 2022, 34 (19) : 1030 - 1033
  • [36] An open hardware implementation of CUSUM based Network Anomaly Detection
    Antichi, Gianni
    Callegari, Christian
    Giordano, Stefano
    2012 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2012, : 2760 - 2765
  • [37] Context-Aware Anomaly Detection in Embedded Systems
    Ehsani-Besheli, Fatemeh
    Zarandi, Hamid R.
    ADVANCES IN DEPENDABILITY ENGINEERING OF COMPLEX SYSTEMS, 2018, 582 : 151 - 165
  • [38] Timing-based Anomaly Detection in Embedded Systems
    Lu, Sixing
    Seo, Minjun
    Lysecky, Roman
    2015 20TH ASIA AND SOUTH PACIFIC DESIGN AUTOMATION CONFERENCE (ASP-DAC), 2015, : 809 - 814
  • [39] Embedded GPU implementation of Anomaly detection for hyperspectral images
    Wu, Yuanfeng
    Gao, Lianru
    Zhang, Bing
    Yang, Bin
    Chen, Zhengchao
    HIGH-PERFORMANCE COMPUTING IN REMOTE SENSING V, 2015, 9646
  • [40] The Design and Analysis of a Hardware-based Anomaly Detection Scheme
    Piao, JinLong
    Kim, Seong Baeg
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2012, 6 (02): : 367 - 372