基于合成电磁指纹的嵌入式设备可扩展异常检测研究

Kurt A. Vedros, Georgios Michail Makrakis, C. Kolias, Robert C. Ivans, C. Rieger
{"title":"基于合成电磁指纹的嵌入式设备可扩展异常检测研究","authors":"Kurt A. Vedros, Georgios Michail Makrakis, C. Kolias, Robert C. Ivans, C. Rieger","doi":"10.5121/csit.2023.130507","DOIUrl":null,"url":null,"abstract":"Embedded devices are omnipresent in modern networks, including those facilitating missioncritical applications. However, due to their constrained nature, novel mechanisms are required to provide external, and non-intrusive defenses. Among such approaches, one that has gained traction is based on analyzing the emanated electromagnetic (EM) signals. Unfortunately, one of the most neglected challenges of this approach is the manual gathering and fingerprinting of the corresponding EM signals. Indeed, even simple programs are comprised of numerous branches, making the fingerprinting stage extremely timeconsuming, and requiring the manual labor of an expert. To address this issue, we propose a framework for generating synthetic EM signals directly from machine code. These subsequent signals can be used to train an anomaly detection system. The advantage of this approach is that it completely removes the need for an elaborate and error-prone fingerprinting stage, thus, increasing the scalability of the protection mechanisms. The experimental evaluations indicate that our method provides above 90% detection accuracy against code injection attacks. Moreover, the proposed methodology inflicts only -1.3% penalty in accuracy for detecting injections of as little as four malicious instructions when compared to the same methods of training on real signals.","PeriodicalId":261978,"journal":{"name":"Computer Science, Engineering and Applications","volume":"15 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-03-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Towards Scalable Anomaly Detection for Embedded Devices through Synthetic EM Fingerprinting\",\"authors\":\"Kurt A. Vedros, Georgios Michail Makrakis, C. Kolias, Robert C. Ivans, C. Rieger\",\"doi\":\"10.5121/csit.2023.130507\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Embedded devices are omnipresent in modern networks, including those facilitating missioncritical applications. However, due to their constrained nature, novel mechanisms are required to provide external, and non-intrusive defenses. Among such approaches, one that has gained traction is based on analyzing the emanated electromagnetic (EM) signals. Unfortunately, one of the most neglected challenges of this approach is the manual gathering and fingerprinting of the corresponding EM signals. Indeed, even simple programs are comprised of numerous branches, making the fingerprinting stage extremely timeconsuming, and requiring the manual labor of an expert. To address this issue, we propose a framework for generating synthetic EM signals directly from machine code. These subsequent signals can be used to train an anomaly detection system. The advantage of this approach is that it completely removes the need for an elaborate and error-prone fingerprinting stage, thus, increasing the scalability of the protection mechanisms. The experimental evaluations indicate that our method provides above 90% detection accuracy against code injection attacks. Moreover, the proposed methodology inflicts only -1.3% penalty in accuracy for detecting injections of as little as four malicious instructions when compared to the same methods of training on real signals.\",\"PeriodicalId\":261978,\"journal\":{\"name\":\"Computer Science, Engineering and Applications\",\"volume\":\"15 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-03-18\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Computer Science, Engineering and Applications\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.5121/csit.2023.130507\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Computer Science, Engineering and Applications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.5121/csit.2023.130507","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

嵌入式设备在现代网络中无处不在,包括那些促进关键任务应用的设备。然而,由于它们的约束性质,需要新的机制来提供外部的、非侵入性的防御。在这些方法中,一种获得了关注的方法是基于分析发射电磁(EM)信号。不幸的是,这种方法最容易被忽视的挑战之一是手动收集和识别相应的电磁信号。实际上,即使是简单的程序也由许多分支组成,这使得指纹识别阶段非常耗时,并且需要专家的手工劳动。为了解决这个问题,我们提出了一个直接从机器码生成合成电磁信号的框架。这些后续信号可以用来训练异常检测系统。这种方法的优点是,它完全不需要复杂且容易出错的指纹识别阶段,从而增加了保护机制的可伸缩性。实验结果表明,该方法对代码注入攻击的检测准确率在90%以上。此外,与在真实信号上训练的相同方法相比,所提出的方法在检测注入的恶意指令时仅造成-1.3%的准确性损失。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Towards Scalable Anomaly Detection for Embedded Devices through Synthetic EM Fingerprinting
Embedded devices are omnipresent in modern networks, including those facilitating missioncritical applications. However, due to their constrained nature, novel mechanisms are required to provide external, and non-intrusive defenses. Among such approaches, one that has gained traction is based on analyzing the emanated electromagnetic (EM) signals. Unfortunately, one of the most neglected challenges of this approach is the manual gathering and fingerprinting of the corresponding EM signals. Indeed, even simple programs are comprised of numerous branches, making the fingerprinting stage extremely timeconsuming, and requiring the manual labor of an expert. To address this issue, we propose a framework for generating synthetic EM signals directly from machine code. These subsequent signals can be used to train an anomaly detection system. The advantage of this approach is that it completely removes the need for an elaborate and error-prone fingerprinting stage, thus, increasing the scalability of the protection mechanisms. The experimental evaluations indicate that our method provides above 90% detection accuracy against code injection attacks. Moreover, the proposed methodology inflicts only -1.3% penalty in accuracy for detecting injections of as little as four malicious instructions when compared to the same methods of training on real signals.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
An Natural Language Processed Web Application that Interpret and Convert English to Python Code A Perceptive Program to Assist Remote Learning for Students with Learning Disabilities using Screen and Bluetooth Output Tracking Emotional Music Generation: An Analysis of Effectiveness and user Satisfaction by using Python and Dart Fun Writer: A Context-Based Intelligent Writing Platform to Assist and Motivate Writing Activities using Artificial Intelligence and Natural Language Processing Use of AI to Diversify and Improve the Performance of RF Sensors Drone Detection Mechanism
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1