2020
DOI: 10.1109/tc.2019.2945767
|View full text |Cite
|
Sign up to set email alerts
|

REMOTE: Robust External Malware Detection Framework by Using Electromagnetic Signals

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
10
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
3
2
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 36 publications
(10 citation statements)
references
References 49 publications
0
10
0
Order By: Relevance
“…A common idea to take advantage of side channel information to detect anomalies is to observe how the system behaves in its normal state, and to raise an alert when a new behavior is recorded. In [19,33], the authors propose to detect malware by observing EM signals. During the monitoring, if the observed EM emanations deviate from the previously observed patterns, this is reported as an anomalous or malicious activity.…”
Section: State-of-the-artmentioning
confidence: 99%
See 2 more Smart Citations
“…A common idea to take advantage of side channel information to detect anomalies is to observe how the system behaves in its normal state, and to raise an alert when a new behavior is recorded. In [19,33], the authors propose to detect malware by observing EM signals. During the monitoring, if the observed EM emanations deviate from the previously observed patterns, this is reported as an anomalous or malicious activity.…”
Section: State-of-the-artmentioning
confidence: 99%
“…Additionally, the usual benign activities for an embedded IoT device such as Linux utilities, device sleep, photo capture, network connections, as well as long duration of executable runtime such as media player, camera capture, video encoder, data backup, data (de)compression (Table 2). This collection varies from short Notably in previous studies using EM emanation, the construction of benign dataset is not considered, or benign activity is only associated with either free-malware activities or benchmark software [6,19,24,33,35]. It simplifies detection drastically and is not realistic where malware, update services as well as IoT activities may share the same behaviors by calling executables from system and third parties.…”
Section: Benign Datasetmentioning
confidence: 99%
See 1 more Smart Citation
“…Leveraging physical side-channel leakages to detect anomalous activity has also been explored by other researchers. Examples include leveraging electromagnetic signals to detect ransomware attacks in cyber-physical systems [12], analyzing and classifying malware in embedded systems [13], and detecting anomalies in medical devices [14].…”
Section: A Related Workmentioning
confidence: 99%
“…The majority of such works are oriented towards achieving anomaly detection or verifying the control flow integrity at the software level. In this context, several alternative modalities have been considered, e.g., (a) the analysis of power consumption of the device [13], [14], [28], [29] or (b) the analysis of radiant EM [1], [4], [15], [19], [34] signals. Each of the approaches has its advantages, with the former being able to profile the behavior of the device as a whole and the latter being capable of providing a higher level of granularity to individual components of the device.…”
Section: Previous Workmentioning
confidence: 99%