etecting a Weakened Encryption Algorithm in Microcontrollers Using Correlation-Based Anomaly Detection

被引:0
|
作者
Wylie, Justin [1 ]
Stone, Samuel [1 ]
Mullins, Barry [1 ]
机构
[1] US Air Force, Inst Technol, Wright Patterson AFB, OH 45433 USA
关键词
microcontroller security; unintentional RF emissions; AES encryption weakening; hardware security; correlation-based anomaly detection;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Since the 1960s, increasingly more Integrated Circuit (IC) device manufacturers have been outsourcing fabrication of semiconductor devices to Taiwan, China, and other countries where the cost of labor is less expensive, as described by Adee (2008). This includes situations where United States companies contracted by the military to develop semiconductor-based systems outsourced the design work for the semiconductors to foreign nations according to Yudken (2010). This practice brings to bear security concerns regarding the possibility of overseas fabrication facilities embedding malicious hardware in the device early in the supply chain. Microcontrollers, specifically, are used in a large number of military operations including encryption, such as the microcontrollers used to encrypt information found in the smart cards issued by the Department of Defense, as stated by the United States General Services Administration (GSA) (2004). According to Beaumont et al. (2011), current IC testing and verification focuses on testing the chips to specifications which may detect whether functionality was removed, but will likely not detect any functionality added by an adversary. Systems used in environments where antivirus and intrusion detection systems are not feasible are particularly vulnerable. In order to detect compromised programming, or potential zero-day attacks from entering combat systems, an efficient and effective method of anomaly detection is required. This paper proposes expanding use of the Correlation-Based Anomaly Detection (CBAD) as introduced by Stone (2013) for detecting anomalous microcontroller operation using Unintentional Radio Frequency (RF) Emissions (UREs). Specifically, this paper presents the results of using the CBAD process to detect a modified Advanced Encryption Standard (AES) algorithm implemented on a microcontroller. This process was shown to be effective in detecting anomalous operations in a more limited Programmable Logic Controller (PLC) program by Stone (2013), and was less resource-intensive than alternatives such as the RF fingerprinting method used for discriminating between hardware devices by Cobb (2011). The CBAD process consists of four major steps: URE collection, signal post-processing, test statistic generation, and a declaration. In the process declaration stage, the microcontroller's program is classified as either Normal operation or Anomalous operation after comparison with a reference response. Results using the CBAD process against the UREs of a microcontroller have been encouraging thus far, and show a True Anomaly Detection Rate (TADR) of greater than 90% at Signal to Noise Ratios (SNRs) greater than 5 dB while maintaining a False Anomaly Detection Rate (FADR) of approximately 10% across all SNRs. Additionally, Receiver Operating Characteristic (ROC) curve Equal Error Rates (EER) are presented for the proposed anomaly detection process.
引用
收藏
页码:335 / 343
页数:9
相关论文
共 50 条
  • [1] Correlation-Based Anomaly Detection in Industrial Control Systems
    Jadidi, Zahra
    Pal, Shantanu
    Hussain, Mukhtar
    Thanh, Kien Nguyen
    [J]. SENSORS, 2023, 23 (03)
  • [2] Advanced Correlation-Based Anomaly Detection Method for Predictive Maintenance
    Zhao, Pushe
    Kurihara, Masaru
    Tanaka, Junichi
    Noda, Tojiro
    Chikuma, Shigeyoshi
    Suzuki, Tadashi
    [J]. 2017 IEEE INTERNATIONAL CONFERENCE ON PROGNOSTICS AND HEALTH MANAGEMENT (ICPHM), 2017, : 78 - 83
  • [3] Improving CAN anomaly detection with correlation-based signal clustering
    Koltai, Beatrix
    Gazdag, András
    Ács, Gergely
    [J]. Infocommunications Journal, 2023, 15 (04): : 17 - 25
  • [4] Correlation-based Streaming Anomaly Detection in Cyber-Security
    Noble, Jordan
    Adams, Niall M.
    [J]. 2016 IEEE 16TH INTERNATIONAL CONFERENCE ON DATA MINING WORKSHOPS (ICDMW), 2016, : 311 - 318
  • [5] A Spatial Correlation-Based Anomaly Detection Method for Subsurface Modeling
    Wendi Liu
    Michael J. Pyrcz
    [J]. Mathematical Geosciences, 2021, 53 : 809 - 822
  • [6] A Spatial Correlation-Based Anomaly Detection Method for Subsurface Modeling
    Liu, Wendi
    Pyrcz, Michael J.
    [J]. MATHEMATICAL GEOSCIENCES, 2021, 53 (05) : 809 - 822
  • [7] Correlation-based feature partition regression method for unsupervised anomaly detection
    Liu, Zhiyu
    Gao, Xin
    Jia, Xin
    Xue, Bing
    Fu, Shiyuan
    Li, Kangsheng
    Huang, Xu
    Huang, Zijian
    [J]. APPLIED INTELLIGENCE, 2022, 52 (13) : 15074 - 15090
  • [8] Correlation-Based Anomaly Detection Method for Multi-sensor System
    Li, Han
    Wang, Xinyu
    Yang, Zhongguo
    Ali, Sikandar
    Tong, Ning
    Baseer, Samad
    [J]. COMPUTATIONAL INTELLIGENCE AND NEUROSCIENCE, 2022, 2022
  • [9] Correlation-based feature partition regression method for unsupervised anomaly detection
    Zhiyu Liu
    Xin Gao
    Xin Jia
    Bing Xue
    Shiyuan Fu
    Kangsheng Li
    Xu Huang
    Zijian Huang
    [J]. Applied Intelligence, 2022, 52 : 15074 - 15090
  • [10] Structural damage detection using an efficient correlation-based index and a modified genetic algorithm
    Nobahari, M.
    Seyedpoor, S. M.
    [J]. MATHEMATICAL AND COMPUTER MODELLING, 2011, 53 (9-10) : 1798 - 1809