Identifying Class Of Previously-Unseen Programs Using Rf Side Channels

Mark Chilenski,Corey Cleveland,Isaac Dekine, Catherine O'Donnell,Gil Raz, Andrew Sciotti, Laura Vertatschitsch

CYBER SENSING 2020(2020)

引用 0|浏览1
暂无评分
摘要
We present results showing that software programs which are not part of the training set can be characterized into broad classes using involuntary RF side channels. This extends previous work on program identification through analog side channels focused on identifying the specific program out of the training set or flagging previously-unseen programs as "anomalous." This new approach enables an intrusion detection system to be robust to benign changes such as software updates and eliminates the need for an exhaustive training set which covers all possible device functions and states. We have applied our approach to a variety of devices under test, ranging from microcontrollers to laptop computers, and identify program classes such as processor-bound, signal processing, database access, etc. This approach is particularly applicable for defending devices which lack the computational resources to run traditional cybersecurity solutions, including industrial control systems (ICS) and internet of things (IoT) devices.
更多
查看译文
关键词
embedded systems, cybersecurity, side-channels, RF side-channels, analog measurements, machine learning
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要