TY - GEN
T1 - Subcomponent timing-based detection of malware in embedded systems
AU - Lu, Sixing
AU - Lysecky, Roman L
AU - Rozenblit, Jerzy W
N1 - Publisher Copyright:
© 2017 IEEE.
PY - 2017/11/22
Y1 - 2017/11/22
N2 - Network-connected embedded systems require multiple lines of defense against malware. In addition to preventing malware by designing secure interfaces and software, anomaly-based detection is needed to detect malware that successfully infiltrates these defenses. Timing based anomaly detection strengthens embedded system security by detecting anomalies in the execution time of critical software tasks. However, existing timing based anomaly detection methods use a lumped timing model that aggregates the timing of the software, processor architecture, operating system scheduling, etc., and thereby incurs significant variability. We present a non-intrusive hardware detector supporting two novel timing models, including a lumped timing multi-range model that clusters timing into multiple range bounds, and a subcomponent timing model that defines bounds for timing subcomponents of events. Timing subcomponents include intrinsic software execution, instruction cache misses, data cache misses, and interrupts. The experimental results demonstrate that the detection based on subcomponent timing model achieves greater malware detection accuracy compared to the lumped timing model without increasing false positives.
AB - Network-connected embedded systems require multiple lines of defense against malware. In addition to preventing malware by designing secure interfaces and software, anomaly-based detection is needed to detect malware that successfully infiltrates these defenses. Timing based anomaly detection strengthens embedded system security by detecting anomalies in the execution time of critical software tasks. However, existing timing based anomaly detection methods use a lumped timing model that aggregates the timing of the software, processor architecture, operating system scheduling, etc., and thereby incurs significant variability. We present a non-intrusive hardware detector supporting two novel timing models, including a lumped timing multi-range model that clusters timing into multiple range bounds, and a subcomponent timing model that defines bounds for timing subcomponents of events. Timing subcomponents include intrinsic software execution, instruction cache misses, data cache misses, and interrupts. The experimental results demonstrate that the detection based on subcomponent timing model achieves greater malware detection accuracy compared to the lumped timing model without increasing false positives.
KW - Anomaly detection
KW - Embedded system security
KW - Non-intrusive
KW - Timing subcomponents
KW - Timing-based detection
UR - http://www.scopus.com/inward/record.url?scp=85041669772&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85041669772&partnerID=8YFLogxK
U2 - 10.1109/ICCD.2017.12
DO - 10.1109/ICCD.2017.12
M3 - Conference contribution
AN - SCOPUS:85041669772
T3 - Proceedings - 35th IEEE International Conference on Computer Design, ICCD 2017
SP - 17
EP - 24
BT - Proceedings - 35th IEEE International Conference on Computer Design, ICCD 2017
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 35th IEEE International Conference on Computer Design, ICCD 2017
Y2 - 5 November 2017 through 8 November 2017
ER -