2017
DOI: 10.1145/3140659.3080223
|View full text |Cite
|
Sign up to set email alerts
|

Eddie

Abstract: This paper describes EM-Based Detection of Deviations in Program Execution (EDDIE), a new method for detecting anomalies in program execution, such as malware and other code injections, without introducing any overheads, adding any hardware support, changing any software, or using any resources on the monitored system itself. Monitoring with EDDIE involves receiving electromagnetic (EM) emanations that are emitted as a side effect of execution on the monitored system, and it relies on spikes in the EM spectrum… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
5
1
1

Relationship

1
6

Authors

Journals

citations
Cited by 12 publications
(2 citation statements)
references
References 60 publications
0
2
0
Order By: Relevance
“…Similarly, [29] studies control flow monitoring by using a neural network architecture to process EM side-channels. [30] introduces an approach for the detection of anomalies in program execution where malware and code injections are detected based on the spikes in the EM spectrum. [31] also works on malware detection with side-channels where autoencoder based deep learning method is proposed.…”
Section: Related Workmentioning
confidence: 99%
“…Similarly, [29] studies control flow monitoring by using a neural network architecture to process EM side-channels. [30] introduces an approach for the detection of anomalies in program execution where malware and code injections are detected based on the spikes in the EM spectrum. [31] also works on malware detection with side-channels where autoencoder based deep learning method is proposed.…”
Section: Related Workmentioning
confidence: 99%
“…As opposed to the publications that show how vulnerable processors are to side channel attacks, some publications use EMI to discern whether or not a process has been modified. For example, EDDIE detects code injections without introducing any overheads or changing the hardware or software [17].…”
Section: Securitymentioning
confidence: 99%