Detecting Code Injections in Noisy Environments Through EM Signal Analysis and SVD Denoising

12/12/2022
by   Ekaterina Miller, et al.
0

The penetration of embedded devices in networks that support critical applications has rendered them a lucrative target for attackers and evildoers. However, traditional protection mechanisms may not be supported due to the memory and computational limitations of these systems. Recently, the analysis of electromagnetic (EM) emanations has gathered the interest of the research community. Thus, analogous protection systems have emerged as a viable solution e.g., for providing external, non-intrusive control-flow attestation for resource-constrained devices. Unfortunately, the majority of current work fails to account for the implications of real-life factors, predominantly the impact of environmental noise. In this work, we introduce a framework that integrates singular value decomposition (SVD) along with outlier detection for discovering malicious modifications of embedded software even under variable conditions of noise. Our proposed framework achieves high detection accuracy i.e., above 93% AUC score for unknown attacks, even for extreme noise conditions i.e., -10 SNR. To the best of our knowledge, this is the first time this realistic limiting factor, i.e., environmental noise, is successfully addressed in the context of EM-based anomaly detection for embedded devices.

READ FULL TEXT
research
02/05/2023

Towards Scalable EM-based Anomaly Detection For Embedded Devices Through Synthetic Fingerprinting

Embedded devices are omnipresent in modern networks including the ones o...
research
05/27/2023

On the Noise Sensitivity of the Randomized SVD

The randomized singular value decomposition (R-SVD) is a popular sketchi...
research
07/29/2019

Fast and Robust 3-D Sound Source Localization with DSVD-PHAT

This paper introduces a variant of the Singular Value Decomposition with...
research
05/29/2020

Fast Execute-Only Memory for Embedded Systems

Remote code disclosure attacks threaten embedded systems as they allow a...
research
11/05/2019

PAIRS: Control Flow Protection using Phantom Addressed Instructions

Code-reuse attacks continue to pose a significant threat to systems secu...
research
06/02/2022

A DTCWT-SVD Based Video Watermarking resistant to frame rate conversion

Videos can be easily tampered, copied and redistributed by attackers for...

Please sign up or login with your details

Forgot password? Click here to reset