2015
DOI: 10.1109/tifs.2015.2422674
|View full text |Cite
|
Sign up to set email alerts
|

A Method for Detecting Abnormal Program Behavior on Embedded Devices

Abstract: Abstract-A potential threat to embedded systems is the execution of unknown or malicious software capable of triggering harmful system behaviour, aimed at theft of sensitive data or causing damage to the system. Commercial off-the-shelf embedded devices, such as embedded medical equipment, are more vulnerable as these type of products cannot be amended conventionally or have limited resources to implement protection mechanisms. In this paper, we present a Self-Organising Map based approach to enhance embedded… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 23 publications
(9 citation statements)
references
References 21 publications
(40 reference statements)
0
9
0
Order By: Relevance
“…Zhai et al [95] proposed a self-organizing map (SOM)-based approach to detect abnormal program behavior in commercial off-the-shelf embedded devices, especially those that cannot be updated conventionally. The proposed method utilizes cycle per instruction (CPI) to extract corresponding program counter (PC) values and uses these to pinpoint malicious behaviors with an unsupervised SOM.…”
Section: Intrusion Detectionmentioning
confidence: 99%
See 1 more Smart Citation
“…Zhai et al [95] proposed a self-organizing map (SOM)-based approach to detect abnormal program behavior in commercial off-the-shelf embedded devices, especially those that cannot be updated conventionally. The proposed method utilizes cycle per instruction (CPI) to extract corresponding program counter (PC) values and uses these to pinpoint malicious behaviors with an unsupervised SOM.…”
Section: Intrusion Detectionmentioning
confidence: 99%
“…In the perception layer, researchers have created methods to detect abnormal status with operation features, such as cycle per instruction (CPI) [95], radio frequency (RF) [10], sensor-device-user interactions [31], and long-term expected values [87]. In the network layer, researchers modeled regular traffic first and then leveraged different methods to identify abnormal sequences, such as model checking [91], packet observation against long-term expected values [87], and artificial neural networks (ANNs) [89].…”
Section: Defensementioning
confidence: 99%
“…• Apply the key generation algorithm. This SPiRIT work has developed practical approaches for analyzing the feature distributions associated with the behaviour of IoT devices [33]. In the context of ICMetrics, the proposed analysis presents some novel challenges as compared to many traditional pattern recognition tasks, because the distribution of values exhibited by the features or characteristics being investigated is more diverse than that found in traditional pattern recognition tasks, often a consequence of the software associated with the device operating in a number of distinct states.…”
Section: A Icmetricsmentioning
confidence: 99%
“…Especially, one can extend SVM to obtain nonlinear decision hyperplanes by exploiting kernelization techniques [9][10][11][12]. Pioneering studies by Xue et al [13], Sebald et al [14], Alam et al [15], and Morsier et al [16] led to different improved SVM models.…”
Section: Introductionmentioning
confidence: 99%