Continuous Authentication of Embedded Software

被引:4
|
作者
Ott, Karl [1 ]
Mahapatra, Rabi [1 ]
机构
[1] Texas A&M Univ, College Stn, TX 77843 USA
关键词
D O I
10.1109/TrustCom/BigDataSE.2019.00026
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper explores the use of frequency information of hardware performance counter data to enable continuous authentication (CA) in embedded software. Current approaches for CA are not targeted for use with embedded software. In order to be more suitable for embedded scenarios the proposed method uses short time Fourier transforms on streams of hardware performance counters. The frequency information is used to build an encoding to a state transition. These transitions are used to build a corresponding state machine which recognizes and authenticates the protected program continuously at run time. The method achieves an average successful authentication true positive rate of 97% with a 1.5% false positive rate.
引用
收藏
页码:128 / 135
页数:8
相关论文
共 50 条
  • [31] DEBUGGING EMBEDDED SOFTWARE
    CIPRIANI, D
    ELECTRONIC DESIGN, 1995, 43 (02) : 103 - &
  • [32] Embedded Software: Inspirium
    Tokuda, Ichirou
    Moride, Shigeki
    FUJITSU SCIENTIFIC & TECHNICAL JOURNAL, 2013, 49 (01): : 97 - 103
  • [33] Embedded Software in Crisis
    Wolf, Marilyn
    COMPUTER, 2016, 49 (01) : 88 - 90
  • [34] Embedded software: Inspirium
    Fujitsu Electronics Inc., Japan
    不详
    Tokuda, I., 1600, Fujitsu Ltd (49):
  • [35] On Testing Embedded Software
    Banerjee, Abhijeet
    Chattopadhyay, Sudipta
    Roychoudhury, Abhik
    ADVANCES IN COMPUTERS, VOL 101, 2016, 101 : 121 - 153
  • [36] Continuous Authentication in Secure Messaging
    Dowling, Benjamin
    Gunther, Felix
    Poirrier, Alexandre
    COMPUTER SECURITY - ESORICS 2022, PT II, 2022, 13555 : 361 - 381
  • [37] Keystroke Dynamics for Continuous Authentication
    Ananya
    Singh, Saurabh
    PROCEEDINGS OF THE 8TH INTERNATIONAL CONFERENCE CONFLUENCE 2018 ON CLOUD COMPUTING, DATA SCIENCE AND ENGINEERING, 2018, : 205 - 208
  • [38] Continuous authentication on relational streams
    Papadopoulos, Stavros
    Yang, Yin
    Papadias, Dimitris
    VLDB JOURNAL, 2010, 19 (02): : 161 - 180
  • [39] Continuous Authentication in Secure Messaging
    Dowling, Benjamin
    Günther, Felix
    Poirrier, Alexandre
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2022, 13555 LNCS : 361 - 381
  • [40] Continuous authentication on relational streams
    Stavros Papadopoulos
    Yin Yang
    Dimitris Papadias
    The VLDB Journal, 2010, 19 : 161 - 180