[go: up one dir, main page]

Gonzalez, 2011 - Google Patents

Power fingerprinting for integrity assessment of embedded systems

Gonzalez, 2011

View PDF
Document ID
1661193309381546103
Author
Gonzalez C
Publication year

External Links

Snippet

This dissertation introduces Power Fingerprinting (PFP), a novel technique for assessing the execution integrity of embedded devices. A PFP monitor is an external device that captures the dynamic power consumption of a processor using fine-grained measurements at the …
Continue reading at vtechworks.lib.vt.edu (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • G06F21/563Static detection by source code analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/566Dynamic detection, i.e. detection performed at run-time, e.g. emulation, suspicious activities
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/83Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/575Secure boot

Similar Documents

Publication Publication Date Title
US10423207B2 (en) Using power fingerprinting (PFP) to monitor the integrity and enhance security of computer based systems
Kornaros Hardware-assisted machine learning in resource-constrained IoT environments for security: review and future prospective
EP2972877B1 (en) Systems, methods, and apparatus to enhance the integrity assessment when using power fingerprinting systems for computer-based systems
Aguayo González et al. Power fingerprinting in sdr integrity assessment for security and regulatory compliance
Sehatbakhsh et al. REMOTE: Robust external malware detection framework by using electromagnetic signals
Parameswaran et al. Embedded systems security—an overview
US10657257B2 (en) Feature vector aggregation for malware detection
Bai et al. Real-time instruction-level verification of remote IoT/CPS devices via side channels
Elnaggar et al. Run-time hardware trojan detection using performance counters
Nguyen et al. A novel golden-chip-free clustering technique using backscattering side channel for hardware trojan detection
Gonzalez Power fingerprinting for integrity assessment of embedded systems
Krishnamurthy et al. Multi-modal side channel data driven golden-free detection of software and firmware Trojans
Liu et al. Practicality of using side-channel analysis for software integrity checking of embedded systems
Awal et al. Impedance leakage vulnerability and its utilization in reverse-engineering embedded software
Liu et al. Gray-box software integrity checking via side-channels
Liu et al. Side-channel Programming for Software Integrity Checking.
Karabacak Detecting Unauthorized Activity in Lightweight IoT Devices
Pan et al. Cybersecurity Landscape for Computer Systems
Jorgensen et al. Novel Feature Selection for Non-destructive Detection of Hardware Trojans Using Hyperspectral Scanning
Liu Black-, grey-, and white-box side-channel programming for software integrity checking
Milosevic et al. Security challenges for hardware designers of mobile systems
Zhou Hardware-Based Workload Forensics and Malware Detection in Modern Microprocessors
Tsague Smart card byte code identification using power electromagnetic radiations analysis and machine learning
HK1186259A (en) Using power fingerprinting (pfp) to monitor the integrity and enhance security of computer based systems
Strobel Novel applications for side-channel analyses of embedded microcontrollers