Sehatbakhsh et al., 2019 - Google Patents
REMOTE: Robust external malware detection framework by using electromagnetic signalsSehatbakhsh et al., 2019
View PDF- Document ID
- 2635416354736058826
- Author
- Sehatbakhsh N
- Nazari A
- Alam M
- Werner F
- Zhu Y
- Zajic A
- Prvulovic M
- Publication year
- Publication venue
- IEEE Transactions on Computers
External Links
Snippet
Cyber-physical systems (CPS) are controlling many critical and sensitive aspects of our physical world while being continuously exposed to potential cyber-attacks. These systems typically have limited performance, memory, and energy reserves, which limits their ability to …
- 238000001514 detection method 0 title abstract description 33
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F1/00—Details of data-processing equipment not covered by groups G06F3/00 - G06F13/00, e.g. cooling, packaging or power supply specially adapted for computer application
- G06F1/26—Power supply means, e.g. regulation thereof
- G06F1/32—Means for saving power
- G06F1/3203—Power Management, i.e. event-based initiation of power-saving mode
- G06F1/3206—Monitoring a parameter, a device or an event triggering a change in power modality
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/556—Detecting local intrusion or implementing counter-measures involving covert channels, i.e. data leakage between processes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/83—Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Sehatbakhsh et al. | REMOTE: Robust external malware detection framework by using electromagnetic signals | |
Duan et al. | Towards measuring supply chain attacks on package managers for interpreted languages | |
Sayakkara et al. | A survey of electromagnetic side-channel attacks and discussion on their case-progressing potential for digital forensics | |
US20220075869A1 (en) | Systems, methods, and apparatuses for intrusion detection and analytics using power characteristics such as side-channel information collection | |
Nazari et al. | Eddie: Em-based detection of deviations in program execution | |
US9886583B2 (en) | Systems, methods, and apparatus to enhance the integrity assessment when using power fingerprinting systems for computer-based systems | |
Khan et al. | Malware detection in embedded systems using neural network model for electromagnetic side-channel signals | |
US20200103949A1 (en) | Using Power Fingerprinting (PFP) to Monitor the Integrity and Enhance Security of Computer Based Systems | |
Tsalis et al. | A taxonomy of side channel attacks on critical infrastructures and relevant systems | |
Shafique et al. | Intelligent security measures for smart cyber physical systems | |
Thummapudi et al. | Detection of ransomware attacks using processor and disk usage data | |
Zajic et al. | Using Analog Side-Channels for Malware Detection | |
Park et al. | A-pot: a comprehensive android analysis platform based on container technology | |
Toffalini et al. | Designing a provenance analysis for SGX enclaves | |
Ji et al. | Device fingerprinting with magnetic induction signals radiated by CPU modules | |
Nappa et al. | Pow-how: An enduring timing side-channel to evade online malware sandboxes | |
Nappa et al. | Scramblesuit: An effective timing side-channels framework for malware sandbox evasion 1 | |
Khan | Side-Channel Signal Analysis for Securing Embedded and Cyber-Physical Systems | |
Karabacak | Detecting Unauthorized Activity in Lightweight IoT Devices | |
Bergstedt | Malware Detection Using Electromagnetic Side-Channel Analysis | |
Thummapudi | Detection of Live Ransomware Attacks Using Processor and Disk Usage Data | |
Al-Saleh | Fine-grained reasoning about the security and usability trade-off in modern security tools | |
Kang | Combining Programs to Enhance Security Software | |
Shahzad | Utilizing Structural & In-execution PCB Information Analysis for Malware Detection on Linux based Smartphones & Computers | |
Besken | Automatic and Policy-based Framework to Detect Ransomware Affecting Linux-based and Resource-constrained Devices |