Utilization of Impedance Disparity Incurred from Switching Activities to Monitor and Characterize Firmware Activities

01/17/2023
by   Md Sadik Awal, et al.
0

The massive trend toward embedded systems introduces new security threats to prevent. Malicious firmware makes it easier to launch cyberattacks against embedded systems. Systems infected with malicious firmware maintain the appearance of normal firmware operation but execute undesirable activities, which is usually a security risk. Traditionally, cybercriminals use malicious firmware to develop possible back-doors for future attacks. Due to the restricted resources of embedded systems, it is difficult to thwart these attacks using the majority of contemporary standard security protocols. In addition, monitoring the firmware operations using existing side channels from outside the processing unit, such as electromagnetic radiation, necessitates a complicated hardware configuration and in-depth technical understanding. In this paper, we propose a physical side channel that is formed by detecting the overall impedance changes induced by the firmware actions of a central processing unit. To demonstrate how this side channel can be exploited for detecting firmware activities, we experimentally validate it using impedance measurements to distinguish between distinct firmware operations with an accuracy of greater than 90 that are trained via machine learning. The implementation of our proposed methodology also leaves room for the use of hardware authentication.

READ FULL TEXT

page 1

page 5

research
08/30/2021

Security For System-On-Chip (SoC) Using Neural Networks

With the growth of embedded systems, VLSI design phases complexity and c...
research
09/23/2019

HealthGuard: A Machine Learning-Based Security Framework for Smart Healthcare Systems

The integration of Internet-of-Things and pervasive computing in medical...
research
12/08/2019

Covert Channel-Based Transmitter Authentication in Controller Area Networks

In recent years, the security of automotive Cyber-Physical Systems (CPSs...
research
07/02/2020

DATE: Defense Against TEmperature Side-Channel Attacks in DVFS Enabled MPSoCs

Given the constant rise in utilizing embedded devices in daily life, sid...
research
06/27/2022

DF-SCA: Dynamic Frequency Side Channel Attacks are Practical

The arm race between hardware security engineers and side-channel resear...
research
06/20/2022

The Greater The Power, The More Dangerous The Abuse: Facing Malicious Insiders in The Cloud

The financial crisis made companies around the world search for cheaper ...
research
10/03/2018

Distributing and Obfuscating Firewalls via Oblivious Bloom Filter Evaluation

Firewalls have long been in use to protect local networks from threats o...

Please sign up or login with your details

Forgot password? Click here to reset