2018
DOI: 10.1145/3276770
|View full text |Cite
|
Sign up to set email alerts
|

Remote Detection of Unauthorized Activity via Spectral Analysis

Abstract: Unauthorized hardware or firmware modifications, known as trojans, can steal information, drain the battery, or damage IoT devices. Since trojans may be triggered in the field at an unknown instance, it is important to detect their presence at runtime. However, it is difficult to run sophisticated detection algorithms on these devices due to limited computational power and energy and, in some cases, lack of accessibility. This article presents a stand-off self-referencing technique for detecting unauthorized a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
4
2

Relationship

1
5

Authors

Journals

citations
Cited by 7 publications
(1 citation statement)
references
References 42 publications
0
1
0
Order By: Relevance
“…We achieve this by generating a test sequence such that the signal (i.e., the response of the device) has spectral properties that can be differentiated from the Trojan activity. We can denote the measured power as follows: where is the sinusoidal power consumption of the primary circuit, denotes the error that we make in setting up the sine wave, is random noise, and is the power consumption of the Trojan circuit [ 2 , 47 , 48 ]. The power spectrum of the primary signal, i.e., is concentrated in one frequency location.…”
Section: Malicious Activity Detectionmentioning
confidence: 99%
“…We achieve this by generating a test sequence such that the signal (i.e., the response of the device) has spectral properties that can be differentiated from the Trojan activity. We can denote the measured power as follows: where is the sinusoidal power consumption of the primary circuit, denotes the error that we make in setting up the sine wave, is random noise, and is the power consumption of the Trojan circuit [ 2 , 47 , 48 ]. The power spectrum of the primary signal, i.e., is concentrated in one frequency location.…”
Section: Malicious Activity Detectionmentioning
confidence: 99%