Research Repository

Detecting compromised programs for embedded system applications

Zhai, X and Appiah, K and Ehsan, S and Cheung, WM and Howells, G and Hu, H and Gu, D and McDonald-Maier, K (2014) Detecting compromised programs for embedded system applications. In: UNSPECIFIED, ? - ?.

Full text not available from this repository.


This paper proposes an approach for detecting compromised programs by analysing suitable features from an embedded system. Features used in this paper are the performance variance and actual program counter values of the embedded processor extracted during program execution. "Cycles per Instruction" is used as pre-processing block before the features are classified using a Self-Organizing Map. Experimental results demonstrate the validity of the proposed approach on detecting some common changes such as deletion, insertion and substitution of programs. Overall, correct detection rate for our system is above 90.9% for tested programs. © 2014 Springer International Publishing Switzerland.

Item Type: Conference or Workshop Item (UNSPECIFIED)
Additional Information: Published proceedings: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Subjects: Q Science > QA Mathematics > QA75 Electronic computers. Computer science
Divisions: Faculty of Science and Health > Computer Science and Electronic Engineering, School of
Depositing User: Jim Jamieson
Date Deposited: 04 Dec 2014 14:20
Last Modified: 22 Jan 2019 22:15

Actions (login required)

View Item View Item