Sehatbakhsh et al., 2019 - Google Patents

REMOTE: Robust external malware detection framework by using electromagnetic signals

Sehatbakhsh et al., 2019

View PDF
Document ID
2635416354736058826
Author
Sehatbakhsh N
Nazari A
Alam M
Werner F
Zhu Y
Zajic A
Prvulovic M
Publication year
Publication venue
IEEE Transactions on Computers

External Links

Snippet

Cyber-physical systems (CPS) are controlling many critical and sensitive aspects of our physical world while being continuously exposed to potential cyber-attacks. These systems typically have limited performance, memory, and energy reserves, which limits their ability to …
Continue reading at ieeexplore.ieee.org (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F1/00Details of data-processing equipment not covered by groups G06F3/00 - G06F13/00, e.g. cooling, packaging or power supply specially adapted for computer application
    • G06F1/26Power supply means, e.g. regulation thereof
    • G06F1/32Means for saving power
    • G06F1/3203Power Management, i.e. event-based initiation of power-saving mode
    • G06F1/3206Monitoring a parameter, a device or an event triggering a change in power modality
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/556Detecting local intrusion or implementing counter-measures involving covert channels, i.e. data leakage between processes
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/83Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof

Similar Documents

Publication Publication Date Title
Sehatbakhsh et al. REMOTE: Robust external malware detection framework by using electromagnetic signals
Duan et al. Towards measuring supply chain attacks on package managers for interpreted languages
Sayakkara et al. A survey of electromagnetic side-channel attacks and discussion on their case-progressing potential for digital forensics
US20220075869A1 (en) Systems, methods, and apparatuses for intrusion detection and analytics using power characteristics such as side-channel information collection
Nazari et al. Eddie: Em-based detection of deviations in program execution
US9886583B2 (en) Systems, methods, and apparatus to enhance the integrity assessment when using power fingerprinting systems for computer-based systems
Khan et al. Malware detection in embedded systems using neural network model for electromagnetic side-channel signals
US20200103949A1 (en) Using Power Fingerprinting (PFP) to Monitor the Integrity and Enhance Security of Computer Based Systems
Tsalis et al. A taxonomy of side channel attacks on critical infrastructures and relevant systems
Shafique et al. Intelligent security measures for smart cyber physical systems
Thummapudi et al. Detection of ransomware attacks using processor and disk usage data
Zajic et al. Using Analog Side-Channels for Malware Detection
Park et al. A-pot: a comprehensive android analysis platform based on container technology
Toffalini et al. Designing a provenance analysis for SGX enclaves
Ji et al. Device fingerprinting with magnetic induction signals radiated by CPU modules
Nappa et al. Pow-how: An enduring timing side-channel to evade online malware sandboxes
Nappa et al. Scramblesuit: An effective timing side-channels framework for malware sandbox evasion 1
Khan Side-Channel Signal Analysis for Securing Embedded and Cyber-Physical Systems
Karabacak Detecting Unauthorized Activity in Lightweight IoT Devices
Bergstedt Malware Detection Using Electromagnetic Side-Channel Analysis
Thummapudi Detection of Live Ransomware Attacks Using Processor and Disk Usage Data
Al-Saleh Fine-grained reasoning about the security and usability trade-off in modern security tools
Kang Combining Programs to Enhance Security Software
Shahzad Utilizing Structural & In-execution PCB Information Analysis for Malware Detection on Linux based Smartphones & Computers
Besken Automatic and Policy-based Framework to Detect Ransomware Affecting Linux-based and Resource-constrained Devices