Time and Sequence Integrated Runtime Anomaly Detection for Embedded Systems

Author:

Lu Sixing1ORCID,Lysecky Roman1

Affiliation:

1. University of Arizona, Tucson, AZ

Abstract

Network-connected embedded systems grow on a large scale as a critical part of Internet of Things, and these systems are under the risk of increasing malware. Anomaly-based detection methods can detect malware in embedded systems effectively and provide the advantage of detecting zero-day exploits relative to signature-based detection methods, but existing approaches incur significant performance overheads and are susceptible to mimicry attacks. In this article, we present a formal runtime security model that defines the normal system behavior including execution sequence and execution timing. The anomaly detection method in this article utilizes on-chip hardware to non-intrusively monitor system execution through trace port of the processor and detect malicious activity at runtime. We further analyze the properties of the timing distribution for control flow events, and select subset of monitoring targets by three selection metrics to meet hardware constraint. The designed detection method is evaluated by a network-connected pacemaker benchmark prototyped in FPGA and simulated in SystemC, with several mimicry attacks implemented at different levels. The resulting detection rate and false positive rate considering constraints on the number of monitored events supported in the on-chip hardware demonstrate good performance of our approach.

Funder

National Science Foundation

Publisher

Association for Computing Machinery (ACM)

Subject

Hardware and Architecture,Software

Reference38 articles.

1. ARM. 2011. Embedded Trace Macrocell ETMv1.0 to ETMv3.5 Architecture Specification. ARM. 2011. Embedded Trace Macrocell ETMv1.0 to ETMv3.5 Architecture Specification.

2. Secure Embedded Processing through Hardware-Assisted Run-Time Monitoring

3. Architectural support for safe software execution on embedded processors

4. Dataflow anomaly detection

5. Efficient, context-sensitive detection of real-world semantic attacks

Cited by 8 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. Anomaly Behaviour tracing of CHERI-RISC V using Hardware-Software Co-design;2023 21st IEEE Interregional NEWCAS Conference (NEWCAS);2023-06-26

2. Benchmark Tool for Detecting Anomalous Program Behaviour on Embedded Devices;2022 IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom);2022-12

3. FIRE: A Finely Integrated Risk Evaluation Methodology for Life-Critical Embedded Systems;Information;2022-10-10

4. Probabilistic Estimation of Threat Intrusion in Embedded Systems for Runtime Detection;ACM Transactions on Embedded Computing Systems;2021-03-31

5. GWAD: Greedy Workflow Graph Anomaly Detection Framework for System Traces;2020 IEEE International Conference on Systems, Man, and Cybernetics (SMC);2020-10-11

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3