Gonzalez, 2011 - Google Patents
Power fingerprinting for integrity assessment of embedded systemsGonzalez, 2011
View PDF- Document ID
- 1661193309381546103
- Author
- Gonzalez C
- Publication year
External Links
Snippet
This dissertation introduces Power Fingerprinting (PFP), a novel technique for assessing the execution integrity of embedded devices. A PFP monitor is an external device that captures the dynamic power consumption of a processor using fine-grained measurements at the …
- 238000000034 method 0 abstract description 87
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
- G06F21/563—Static detection by source code analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/566—Dynamic detection, i.e. detection performed at run-time, e.g. emulation, suspicious activities
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/83—Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/575—Secure boot
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10423207B2 (en) | Using power fingerprinting (PFP) to monitor the integrity and enhance security of computer based systems | |
Kornaros | Hardware-assisted machine learning in resource-constrained IoT environments for security: review and future prospective | |
EP2972877B1 (en) | Systems, methods, and apparatus to enhance the integrity assessment when using power fingerprinting systems for computer-based systems | |
Aguayo González et al. | Power fingerprinting in sdr integrity assessment for security and regulatory compliance | |
Sehatbakhsh et al. | REMOTE: Robust external malware detection framework by using electromagnetic signals | |
Parameswaran et al. | Embedded systems security—an overview | |
US10657257B2 (en) | Feature vector aggregation for malware detection | |
Bai et al. | Real-time instruction-level verification of remote IoT/CPS devices via side channels | |
Elnaggar et al. | Run-time hardware trojan detection using performance counters | |
Nguyen et al. | A novel golden-chip-free clustering technique using backscattering side channel for hardware trojan detection | |
Gonzalez | Power fingerprinting for integrity assessment of embedded systems | |
Krishnamurthy et al. | Multi-modal side channel data driven golden-free detection of software and firmware Trojans | |
Liu et al. | Practicality of using side-channel analysis for software integrity checking of embedded systems | |
Awal et al. | Impedance leakage vulnerability and its utilization in reverse-engineering embedded software | |
Liu et al. | Gray-box software integrity checking via side-channels | |
Liu et al. | Side-channel Programming for Software Integrity Checking. | |
Karabacak | Detecting Unauthorized Activity in Lightweight IoT Devices | |
Pan et al. | Cybersecurity Landscape for Computer Systems | |
Jorgensen et al. | Novel Feature Selection for Non-destructive Detection of Hardware Trojans Using Hyperspectral Scanning | |
Liu | Black-, grey-, and white-box side-channel programming for software integrity checking | |
Milosevic et al. | Security challenges for hardware designers of mobile systems | |
Zhou | Hardware-Based Workload Forensics and Malware Detection in Modern Microprocessors | |
Tsague | Smart card byte code identification using power electromagnetic radiations analysis and machine learning | |
HK1186259A (en) | Using power fingerprinting (pfp) to monitor the integrity and enhance security of computer based systems | |
Strobel | Novel applications for side-channel analyses of embedded microcontrollers |