Towards Scalable EM-based Anomaly Detection For Embedded Devices Through Synthetic Fingerprinting
Embedded devices are omnipresent in modern networks including the ones operating inside critical environments. However, due to their constrained nature, novel mechanisms are required to provide external, and non-intrusive anomaly detection. Among such approaches, one that has gained traction is base...
Gespeichert in:
Veröffentlicht in: | arXiv.org 2023-02 |
---|---|
Hauptverfasser: | , , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | |
---|---|
container_issue | |
container_start_page | |
container_title | arXiv.org |
container_volume | |
creator | Vedros, Kurt A Georgios Michail Makrakis Kolias, Constantinos Ivans, Robert C Rieger, Craig |
description | Embedded devices are omnipresent in modern networks including the ones operating inside critical environments. However, due to their constrained nature, novel mechanisms are required to provide external, and non-intrusive anomaly detection. Among such approaches, one that has gained traction is based on the analysis of the electromagnetic (EM) signals that get emanated during a device's operation. However, one of the most neglected challenges of this approach is the requirement for manually gathering and fingerprinting the signals that correspond to each execution path of the software/firmware. Indeed, even simple programs are comprised of hundreds if not thousands of branches thus, making the fingerprinting stage an extremely time-consuming process that involves the manual labor of a human specialist. To address this issue, we propose a framework for generating synthetic EM signals directly from the machine code. The synthetic signals can be used to train a Machine Learning based (ML) system for anomaly detection. The main advantage of the proposed approach is that it completely removes the need for an elaborate and error-prone fingerprinting stage, thus, dramatically increasing the scalability of the corresponding protection mechanisms. The experimental evaluations indicate that our method provides high detection accuracy (above 90% AUC score) when employed for the detection of injection attacks. Moreover, the proposed methodology inflicts only a small penalty (-1.3%) in accuracy for the detection of the injection of as little as four malicious instructions when compared to the same methods if real signals were to be used. |
format | Article |
fullrecord | <record><control><sourceid>proquest</sourceid><recordid>TN_cdi_proquest_journals_2774006145</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2774006145</sourcerecordid><originalsourceid>FETCH-proquest_journals_27740061453</originalsourceid><addsrcrecordid>eNqNir0OgjAYABsTE4nyDl_iTFLKn6sRiIsT7KTAJ5RAi23R8PYy-ABOd8ndjjgsCHzvEjJ2IK4xA6WUxQmLosAhvFQfrlsDRcNHXo8I2cOrucEWrlJNfFwhRYuNFUpCrjRkU41tu-UU36JBA2Wv1dL1UKzS9mhFA7mQHepZC2k3O5H9k48G3R-P5Jxn5e3uzVq9FjS2GtSi5ZYqliQhpbEfRsF_1xfqsUTt</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2774006145</pqid></control><display><type>article</type><title>Towards Scalable EM-based Anomaly Detection For Embedded Devices Through Synthetic Fingerprinting</title><source>Free E- Journals</source><creator>Vedros, Kurt A ; Georgios Michail Makrakis ; Kolias, Constantinos ; Ivans, Robert C ; Rieger, Craig</creator><creatorcontrib>Vedros, Kurt A ; Georgios Michail Makrakis ; Kolias, Constantinos ; Ivans, Robert C ; Rieger, Craig</creatorcontrib><description>Embedded devices are omnipresent in modern networks including the ones operating inside critical environments. However, due to their constrained nature, novel mechanisms are required to provide external, and non-intrusive anomaly detection. Among such approaches, one that has gained traction is based on the analysis of the electromagnetic (EM) signals that get emanated during a device's operation. However, one of the most neglected challenges of this approach is the requirement for manually gathering and fingerprinting the signals that correspond to each execution path of the software/firmware. Indeed, even simple programs are comprised of hundreds if not thousands of branches thus, making the fingerprinting stage an extremely time-consuming process that involves the manual labor of a human specialist. To address this issue, we propose a framework for generating synthetic EM signals directly from the machine code. The synthetic signals can be used to train a Machine Learning based (ML) system for anomaly detection. The main advantage of the proposed approach is that it completely removes the need for an elaborate and error-prone fingerprinting stage, thus, dramatically increasing the scalability of the corresponding protection mechanisms. The experimental evaluations indicate that our method provides high detection accuracy (above 90% AUC score) when employed for the detection of injection attacks. Moreover, the proposed methodology inflicts only a small penalty (-1.3%) in accuracy for the detection of the injection of as little as four malicious instructions when compared to the same methods if real signals were to be used.</description><identifier>EISSN: 2331-8422</identifier><language>eng</language><publisher>Ithaca: Cornell University Library, arXiv.org</publisher><subject>Anomalies ; Electronic devices ; Embedded systems ; Fingerprinting ; Firmware ; Machine learning ; Physical work</subject><ispartof>arXiv.org, 2023-02</ispartof><rights>2023. This work is published under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.</rights><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>777,781</link.rule.ids></links><search><creatorcontrib>Vedros, Kurt A</creatorcontrib><creatorcontrib>Georgios Michail Makrakis</creatorcontrib><creatorcontrib>Kolias, Constantinos</creatorcontrib><creatorcontrib>Ivans, Robert C</creatorcontrib><creatorcontrib>Rieger, Craig</creatorcontrib><title>Towards Scalable EM-based Anomaly Detection For Embedded Devices Through Synthetic Fingerprinting</title><title>arXiv.org</title><description>Embedded devices are omnipresent in modern networks including the ones operating inside critical environments. However, due to their constrained nature, novel mechanisms are required to provide external, and non-intrusive anomaly detection. Among such approaches, one that has gained traction is based on the analysis of the electromagnetic (EM) signals that get emanated during a device's operation. However, one of the most neglected challenges of this approach is the requirement for manually gathering and fingerprinting the signals that correspond to each execution path of the software/firmware. Indeed, even simple programs are comprised of hundreds if not thousands of branches thus, making the fingerprinting stage an extremely time-consuming process that involves the manual labor of a human specialist. To address this issue, we propose a framework for generating synthetic EM signals directly from the machine code. The synthetic signals can be used to train a Machine Learning based (ML) system for anomaly detection. The main advantage of the proposed approach is that it completely removes the need for an elaborate and error-prone fingerprinting stage, thus, dramatically increasing the scalability of the corresponding protection mechanisms. The experimental evaluations indicate that our method provides high detection accuracy (above 90% AUC score) when employed for the detection of injection attacks. Moreover, the proposed methodology inflicts only a small penalty (-1.3%) in accuracy for the detection of the injection of as little as four malicious instructions when compared to the same methods if real signals were to be used.</description><subject>Anomalies</subject><subject>Electronic devices</subject><subject>Embedded systems</subject><subject>Fingerprinting</subject><subject>Firmware</subject><subject>Machine learning</subject><subject>Physical work</subject><issn>2331-8422</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2023</creationdate><recordtype>article</recordtype><sourceid>ABUWG</sourceid><sourceid>AFKRA</sourceid><sourceid>AZQEC</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><recordid>eNqNir0OgjAYABsTE4nyDl_iTFLKn6sRiIsT7KTAJ5RAi23R8PYy-ABOd8ndjjgsCHzvEjJ2IK4xA6WUxQmLosAhvFQfrlsDRcNHXo8I2cOrucEWrlJNfFwhRYuNFUpCrjRkU41tu-UU36JBA2Wv1dL1UKzS9mhFA7mQHepZC2k3O5H9k48G3R-P5Jxn5e3uzVq9FjS2GtSi5ZYqliQhpbEfRsF_1xfqsUTt</recordid><startdate>20230205</startdate><enddate>20230205</enddate><creator>Vedros, Kurt A</creator><creator>Georgios Michail Makrakis</creator><creator>Kolias, Constantinos</creator><creator>Ivans, Robert C</creator><creator>Rieger, Craig</creator><general>Cornell University Library, arXiv.org</general><scope>8FE</scope><scope>8FG</scope><scope>ABJCF</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>HCIFZ</scope><scope>L6V</scope><scope>M7S</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>PTHSS</scope></search><sort><creationdate>20230205</creationdate><title>Towards Scalable EM-based Anomaly Detection For Embedded Devices Through Synthetic Fingerprinting</title><author>Vedros, Kurt A ; Georgios Michail Makrakis ; Kolias, Constantinos ; Ivans, Robert C ; Rieger, Craig</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-proquest_journals_27740061453</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2023</creationdate><topic>Anomalies</topic><topic>Electronic devices</topic><topic>Embedded systems</topic><topic>Fingerprinting</topic><topic>Firmware</topic><topic>Machine learning</topic><topic>Physical work</topic><toplevel>online_resources</toplevel><creatorcontrib>Vedros, Kurt A</creatorcontrib><creatorcontrib>Georgios Michail Makrakis</creatorcontrib><creatorcontrib>Kolias, Constantinos</creatorcontrib><creatorcontrib>Ivans, Robert C</creatorcontrib><creatorcontrib>Rieger, Craig</creatorcontrib><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>Materials Science & Engineering Collection</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Engineering Collection</collection><collection>Engineering Database</collection><collection>Publicly Available Content Database</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>Engineering Collection</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Vedros, Kurt A</au><au>Georgios Michail Makrakis</au><au>Kolias, Constantinos</au><au>Ivans, Robert C</au><au>Rieger, Craig</au><format>book</format><genre>document</genre><ristype>GEN</ristype><atitle>Towards Scalable EM-based Anomaly Detection For Embedded Devices Through Synthetic Fingerprinting</atitle><jtitle>arXiv.org</jtitle><date>2023-02-05</date><risdate>2023</risdate><eissn>2331-8422</eissn><abstract>Embedded devices are omnipresent in modern networks including the ones operating inside critical environments. However, due to their constrained nature, novel mechanisms are required to provide external, and non-intrusive anomaly detection. Among such approaches, one that has gained traction is based on the analysis of the electromagnetic (EM) signals that get emanated during a device's operation. However, one of the most neglected challenges of this approach is the requirement for manually gathering and fingerprinting the signals that correspond to each execution path of the software/firmware. Indeed, even simple programs are comprised of hundreds if not thousands of branches thus, making the fingerprinting stage an extremely time-consuming process that involves the manual labor of a human specialist. To address this issue, we propose a framework for generating synthetic EM signals directly from the machine code. The synthetic signals can be used to train a Machine Learning based (ML) system for anomaly detection. The main advantage of the proposed approach is that it completely removes the need for an elaborate and error-prone fingerprinting stage, thus, dramatically increasing the scalability of the corresponding protection mechanisms. The experimental evaluations indicate that our method provides high detection accuracy (above 90% AUC score) when employed for the detection of injection attacks. Moreover, the proposed methodology inflicts only a small penalty (-1.3%) in accuracy for the detection of the injection of as little as four malicious instructions when compared to the same methods if real signals were to be used.</abstract><cop>Ithaca</cop><pub>Cornell University Library, arXiv.org</pub><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | EISSN: 2331-8422 |
ispartof | arXiv.org, 2023-02 |
issn | 2331-8422 |
language | eng |
recordid | cdi_proquest_journals_2774006145 |
source | Free E- Journals |
subjects | Anomalies Electronic devices Embedded systems Fingerprinting Firmware Machine learning Physical work |
title | Towards Scalable EM-based Anomaly Detection For Embedded Devices Through Synthetic Fingerprinting |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-19T10%3A55%3A45IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=document&rft.atitle=Towards%20Scalable%20EM-based%20Anomaly%20Detection%20For%20Embedded%20Devices%20Through%20Synthetic%20Fingerprinting&rft.jtitle=arXiv.org&rft.au=Vedros,%20Kurt%20A&rft.date=2023-02-05&rft.eissn=2331-8422&rft_id=info:doi/&rft_dat=%3Cproquest%3E2774006145%3C/proquest%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2774006145&rft_id=info:pmid/&rfr_iscdi=true |