Proceedings of the 2005 International Conference on Compilers, Architectures and Synthesis for Embedded Systems 2005
DOI: 10.1145/1086297.1086305
|View full text |Cite
|
Sign up to set email alerts
|

Anomalous path detection with hardware support

Abstract: Embedded systems are being deployed as a part of critical infrastructures and are vulnerable to malicious attacks due to internet accessibility. Intrusion detection systems have been proposed to protect computer systems from unauthorized penetration. Detecting an attack early on pays off since further damage is avoided and in some cases, resilient recovery could be adopted. This is especially important for embedded systems deployed in critical infrastructures such as Power Grids etc. where a timely interventio… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
33
0

Year Published

2006
2006
2018
2018

Publication Types

Select...
3
3
2

Relationship

0
8

Authors

Journals

citations
Cited by 55 publications
(36 citation statements)
references
References 19 publications
(24 reference statements)
1
33
0
Order By: Relevance
“…This, together with its sophisticated cache management algorithm, causes considerable memory overhead (3.02MByte vs 512Kbit hardware memory) and performance degradation (up to 170% vs 7.7%) comparing to our solution. Another similar work [25] also validates control flow transfer in hardware. But it mainly focuses on direct jumps and uses a sophisticated co-processor.…”
Section: Related Work and Comparisonssupporting
confidence: 53%
See 1 more Smart Citation
“…This, together with its sophisticated cache management algorithm, causes considerable memory overhead (3.02MByte vs 512Kbit hardware memory) and performance degradation (up to 170% vs 7.7%) comparing to our solution. Another similar work [25] also validates control flow transfer in hardware. But it mainly focuses on direct jumps and uses a sophisticated co-processor.…”
Section: Related Work and Comparisonssupporting
confidence: 53%
“…Also, during the software testing and development phase, the test cases being used should cover most, if not all, possible execution paths for each branch; therefore an IBP table can be generated as a side product. The second way to initialize the IBP table is to perform "training" as many model-based solutions have done [10][11] [25]. By running the application either in a particular time interval or until the unique IBPs converges in a secure environment, the processor can regard all seen IBPs as legitimate ones.…”
Section: Training Ibp Tablementioning
confidence: 99%
“…The SICM mode makes creation of meaningful arc injection attacks much more difficult, but it does not prevent them. Complete protection from such attacks may be provided by using a dedicated resource to store allowed targets of indirect jumps and a secure stack [8], or by using data encryption.…”
Section: Secure Program Installationmentioning
confidence: 99%
“…It has been extensively studied for applications in fault tolerance [4,5,8,9,10,11,12,13,14,16] and computer security [1,2,18]. CFC techniques are either implemented in hardware using an on-chip monitor or watchdog processor (WP) [2,4,5,8,9,10,11,13,14,18] (or equivalently, an off-chip WP in systems without on-chip caches) or in software [1,12,16]. Hardware implemented CFC using on-chip WPs have the advantages of potentially low performance overheads, but also the disadvantage of imposing appreciable processor chip-area overhead that can indirectly lower performance (some high-performance enabling hardware has to be left out when the die area is a constraint) or result in higher cost (due to increased die area).…”
Section: Control Flow Checking (Cfc)mentioning
confidence: 99%
“…Hardware implemented CFC using on-chip WPs have the advantages of potentially low performance overheads, but also the disadvantage of imposing appreciable processor chip-area overhead that can indirectly lower performance (some high-performance enabling hardware has to be left out when the die area is a constraint) or result in higher cost (due to increased die area). Software-based CFCs can work with any commodity processor but have the disadvantage of high performance overheads, as well as vulnerability to security attacks [18]. In this paper, we develop techniques for off-chip hardware-based CFC that have little of the above disadvantages of on-chip and software techniques, but have most of their advantages.…”
Section: Control Flow Checking (Cfc)mentioning
confidence: 99%