Research Repository

Detecting Compromised Programs for Embedded System Applications

Zhai, Xiaojun and Appiah, Kofi and Ehsan, Shoaib and Cheung, Wah M and Howells, Gareth and Hu, Huosheng and Gu, Dongbing and McDonald-Maier, Klaus (2014) Detecting Compromised Programs for Embedded System Applications. In: 27th International Conference on Architecture of Computing Systems - ARCS 2014, 2014-02-25 - 2014-02-28, Lübeck, Germany.

[img]
Preview
Text
ARCS2014_camera-ready-v1.pdf - Accepted Version

Download (751kB) | Preview

Abstract

This paper proposes an approach for detecting compromised programs by analysing suitable features from an embedded system. Features used in this paper are the performance variance and actual program counter values of the embedded processor extracted during program execution. “Cycles per Instruction” is used as pre-processing block before the features are classified using a Self-Organizing Map. Experimental results demonstrate the validity of the proposed approach on detecting some common changes such as deletion, insertion and substitution of programs. Overall, correct detection rate for our system is above 90.9% for tested programs.

Item Type: Conference or Workshop Item (UNSPECIFIED)
Additional Information: Published proceedings: Proceedings of the 27th International Conference on Architecture of Computing Systems – ARCS 2014, Lübeck, Germany, February 25-28, 2014. Part of the Lecture Notes in Computer Science book series (LNCS, volume 8350)
Subjects: Q Science > QA Mathematics > QA75 Electronic computers. Computer science
Divisions: Faculty of Science and Health > Computer Science and Electronic Engineering, School of
Depositing User: Jim Jamieson
Date Deposited: 04 Dec 2014 14:20
Last Modified: 02 Jun 2020 16:15
URI: http://repository.essex.ac.uk/id/eprint/11987

Actions (login required)

View Item View Item