etecting a Weakened Encryption Algorithm in Microcontrollers Using Correlation-Based Anomaly Detection

被引:0
|
作者
Wylie, Justin [1 ]
Stone, Samuel [1 ]
Mullins, Barry [1 ]
机构
[1] US Air Force, Inst Technol, Wright Patterson AFB, OH 45433 USA
关键词
microcontroller security; unintentional RF emissions; AES encryption weakening; hardware security; correlation-based anomaly detection;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Since the 1960s, increasingly more Integrated Circuit (IC) device manufacturers have been outsourcing fabrication of semiconductor devices to Taiwan, China, and other countries where the cost of labor is less expensive, as described by Adee (2008). This includes situations where United States companies contracted by the military to develop semiconductor-based systems outsourced the design work for the semiconductors to foreign nations according to Yudken (2010). This practice brings to bear security concerns regarding the possibility of overseas fabrication facilities embedding malicious hardware in the device early in the supply chain. Microcontrollers, specifically, are used in a large number of military operations including encryption, such as the microcontrollers used to encrypt information found in the smart cards issued by the Department of Defense, as stated by the United States General Services Administration (GSA) (2004). According to Beaumont et al. (2011), current IC testing and verification focuses on testing the chips to specifications which may detect whether functionality was removed, but will likely not detect any functionality added by an adversary. Systems used in environments where antivirus and intrusion detection systems are not feasible are particularly vulnerable. In order to detect compromised programming, or potential zero-day attacks from entering combat systems, an efficient and effective method of anomaly detection is required. This paper proposes expanding use of the Correlation-Based Anomaly Detection (CBAD) as introduced by Stone (2013) for detecting anomalous microcontroller operation using Unintentional Radio Frequency (RF) Emissions (UREs). Specifically, this paper presents the results of using the CBAD process to detect a modified Advanced Encryption Standard (AES) algorithm implemented on a microcontroller. This process was shown to be effective in detecting anomalous operations in a more limited Programmable Logic Controller (PLC) program by Stone (2013), and was less resource-intensive than alternatives such as the RF fingerprinting method used for discriminating between hardware devices by Cobb (2011). The CBAD process consists of four major steps: URE collection, signal post-processing, test statistic generation, and a declaration. In the process declaration stage, the microcontroller's program is classified as either Normal operation or Anomalous operation after comparison with a reference response. Results using the CBAD process against the UREs of a microcontroller have been encouraging thus far, and show a True Anomaly Detection Rate (TADR) of greater than 90% at Signal to Noise Ratios (SNRs) greater than 5 dB while maintaining a False Anomaly Detection Rate (FADR) of approximately 10% across all SNRs. Additionally, Receiver Operating Characteristic (ROC) curve Equal Error Rates (EER) are presented for the proposed anomaly detection process.
引用
收藏
页码:335 / 343
页数:9
相关论文
共 50 条
  • [21] An Anomaly Detection Algorithm for Spatiotemporal Data Based on Attribute Correlation
    Chen, Aiguo
    Chen, Yuanfan
    Lu, Guoming
    Zhang, Lizong
    Luo, Jiacheng
    [J]. ADVANCED MULTIMEDIA AND UBIQUITOUS ENGINEERING, MUE/FUTURETECH 2018, 2019, 518 : 83 - 89
  • [22] A Spatial Correlation-Based Wireless Routing Algorithm
    Zhai, Lidong
    Wang, Zhilei
    Zhu, Yujia
    Quan, Daiyong
    [J]. 2013 25TH CHINESE CONTROL AND DECISION CONFERENCE (CCDC), 2013, : 3751 - 3754
  • [23] Correlation-based temperature and emissivity separation algorithm
    CHENG Jie1
    2 Beijing Key Laboratory of Environmental Remote Sensing and City Digitalization
    3Graduate University of Chinese Academy of Sciences
    [J]. Science China Earth Sciences, 2008, (03) : 357 - 369
  • [24] Correlation-based temperature and emissivity separation algorithm
    Jie Cheng
    QinHuo Liu
    XiaoWen Li
    Qing Xiao
    Qiang Liu
    YongMing Du
    [J]. Science in China Series D: Earth Sciences, 2008, 51 : 357 - 369
  • [25] Correlation-based temperature and emissivity separation algorithm
    Cheng Jie
    Liu QinHuo
    Li XiaoWen
    Xiao Qing
    Liu Qiang
    Du YongMing
    [J]. SCIENCE IN CHINA SERIES D-EARTH SCIENCES, 2008, 51 (03): : 357 - 369
  • [26] A Correlation-Based Algorithm for Classifying Technical Articles
    Kilany, Rania
    Ammar, Reda
    Rajasekaran, Sanguthevar
    [J]. 2011 IEEE INTERNATIONAL SYMPOSIUM ON SIGNAL PROCESSING AND INFORMATION TECHNOLOGY (ISSPIT), 2011, : 50 - 53
  • [27] Damage detection and correlation-based localization using wireless mote sensors
    Clayton, EH
    Koh, BH
    Xing, GL
    Fok, CL
    Dyke, SJ
    Lu, CY
    [J]. 2005 IEEE INTERNATIONAL SYMPOSIUM ON INTELLIGENT CONTROL & 13TH MEDITERRANEAN CONFERENCE ON CONTROL AND AUTOMATION, VOLS 1 AND 2, 2005, : 304 - 309
  • [28] Malware Detection Using Deep Learning and Correlation-Based Feature Selection
    Alomari, Esraa Saleh
    Nuiaa, Riyadh Rahef
    Alyasseri, Zaid Abdi Alkareem
    Mohammed, Husam Jasim
    Sani, Nor Samsiah
    Esa, Mohd Isrul
    Musawi, Bashaer Abbuod
    [J]. SYMMETRY-BASEL, 2023, 15 (01):
  • [29] Correlation Methods of OCR Algorithm for Traffic Sign Detection Implementable in Microcontrollers
    Hercik, Radim
    Slaby, Roman
    Machacek, Zdenek
    Koziorek, Jiri
    [J]. INTERNATIONAL JOINT CONFERENCE CISIS'12 - ICEUTE'12 - SOCO'12 SPECIAL SESSIONS, 2013, 189 : 381 - 389
  • [30] A correlation-based approach for event detection in Instagram
    dos Santos, Elder Donizetti
    Quiles, Marcos Goncalves
    Faria, Fabio Augusto
    [J]. JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2018, 34 (05) : 2971 - 2982