語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Detecting Unauthorized Activity in L...
~
Karabacak, Fatih.
FindBook
Google Book
Amazon
博客來
Detecting Unauthorized Activity in Lightweight IoT Devices.
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Detecting Unauthorized Activity in Lightweight IoT Devices./
作者:
Karabacak, Fatih.
出版者:
Ann Arbor : ProQuest Dissertations & Theses, : 2020,
面頁冊數:
107 p.
附註:
Source: Dissertations Abstracts International, Volume: 82-03, Section: B.
Contained By:
Dissertations Abstracts International82-03B.
標題:
Electrical engineering. -
電子資源:
https://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=28029271
ISBN:
9798664758580
Detecting Unauthorized Activity in Lightweight IoT Devices.
Karabacak, Fatih.
Detecting Unauthorized Activity in Lightweight IoT Devices.
- Ann Arbor : ProQuest Dissertations & Theses, 2020 - 107 p.
Source: Dissertations Abstracts International, Volume: 82-03, Section: B.
Thesis (Ph.D.)--Arizona State University, 2020.
This item must not be sold to any third party vendors.
The manufacturing process for electronic systems involves many players, from chip/board design and fabrication to firmware design and installation. In today's global supply chain, any of these steps are prone to interference from rogue players, creating a security risk. Manufactured devices need to be verified to perform only their intended operations since it is not economically feasible to control the supply chain and use only trusted facilities. It is becoming increasingly necessary to trust but verify the received devices both at production and in the field.Unauthorized hardware or firmware modifications, known as Trojans, can steal information, drain the battery, or damage battery-driven embedded systems and lightweight Internet of Things (IoT) devices. Since Trojans may be triggered in the field at an unknown instance, it is essential to detect their presence at run-time. However, it isn't easy to run sophisticated detection algorithms on these devices due to limited computational power and energy, and in some cases, lack of accessibility. Since finding a trusted sample is infeasible in general, the proposed technique is based on self-referencing to remove any effect of environmental or device-to-device variations in the frequency domain. In particular, the self-referencing is achieved by exploiting the band-limited nature of Trojan activity using signal detection theory. When the device enters the test mode, a predefined test application is run on the device repetitively for a known period. The periodicity ensures that the spectral electromagnetic power of the test application concentrates at known frequencies, leaving the remaining frequencies within the operating bandwidth at the noise level. Any deviations from the noise level for these unoccupied frequency locations indicate the presence of unknown (unauthorized) activity. Hence, the malicious activity can differentiate without using a golden reference or any knowledge of the Trojan activity attributes.The proposed technique's effectiveness is demonstrated through experiments with collecting and processing side-channel signals, such as involuntarily electromagnetic emissions and power consumption, of a wearable electronics prototype and commercial system-on-chip under a variety of practical scenarios.
ISBN: 9798664758580Subjects--Topical Terms:
649834
Electrical engineering.
Subjects--Index Terms:
Flexible electronic security
Detecting Unauthorized Activity in Lightweight IoT Devices.
LDR
:03553nmm a2200385 4500
001
2275812
005
20210401103743.5
008
220723s2020 ||||||||||||||||| ||eng d
020
$a
9798664758580
035
$a
(MiAaPQ)AAI28029271
035
$a
AAI28029271
040
$a
MiAaPQ
$c
MiAaPQ
100
1
$a
Karabacak, Fatih.
$3
3554053
245
1 0
$a
Detecting Unauthorized Activity in Lightweight IoT Devices.
260
1
$a
Ann Arbor :
$b
ProQuest Dissertations & Theses,
$c
2020
300
$a
107 p.
500
$a
Source: Dissertations Abstracts International, Volume: 82-03, Section: B.
500
$a
Advisor: Ozev, Sule;Ogras, Umit.
502
$a
Thesis (Ph.D.)--Arizona State University, 2020.
506
$a
This item must not be sold to any third party vendors.
520
$a
The manufacturing process for electronic systems involves many players, from chip/board design and fabrication to firmware design and installation. In today's global supply chain, any of these steps are prone to interference from rogue players, creating a security risk. Manufactured devices need to be verified to perform only their intended operations since it is not economically feasible to control the supply chain and use only trusted facilities. It is becoming increasingly necessary to trust but verify the received devices both at production and in the field.Unauthorized hardware or firmware modifications, known as Trojans, can steal information, drain the battery, or damage battery-driven embedded systems and lightweight Internet of Things (IoT) devices. Since Trojans may be triggered in the field at an unknown instance, it is essential to detect their presence at run-time. However, it isn't easy to run sophisticated detection algorithms on these devices due to limited computational power and energy, and in some cases, lack of accessibility. Since finding a trusted sample is infeasible in general, the proposed technique is based on self-referencing to remove any effect of environmental or device-to-device variations in the frequency domain. In particular, the self-referencing is achieved by exploiting the band-limited nature of Trojan activity using signal detection theory. When the device enters the test mode, a predefined test application is run on the device repetitively for a known period. The periodicity ensures that the spectral electromagnetic power of the test application concentrates at known frequencies, leaving the remaining frequencies within the operating bandwidth at the noise level. Any deviations from the noise level for these unoccupied frequency locations indicate the presence of unknown (unauthorized) activity. Hence, the malicious activity can differentiate without using a golden reference or any knowledge of the Trojan activity attributes.The proposed technique's effectiveness is demonstrated through experiments with collecting and processing side-channel signals, such as involuntarily electromagnetic emissions and power consumption, of a wearable electronics prototype and commercial system-on-chip under a variety of practical scenarios.
590
$a
School code: 0010.
650
4
$a
Electrical engineering.
$3
649834
650
4
$a
Computer engineering.
$3
621879
650
4
$a
Engineering.
$3
586835
650
4
$a
Computer security.
$3
540555
653
$a
Flexible electronic security
653
$a
Hardware/firmware Trojan detection
653
$a
IoT security
653
$a
Malicious activity detection
653
$a
Side-channel analysis
653
$a
Wearable electronic device security
690
$a
0544
690
$a
0464
690
$a
0537
710
2
$a
Arizona State University.
$b
Electrical Engineering.
$3
1671741
773
0
$t
Dissertations Abstracts International
$g
82-03B.
790
$a
0010
791
$a
Ph.D.
792
$a
2020
793
$a
English
856
4 0
$u
https://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=28029271
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9427546
電子資源
11.線上閱覽_V
電子書
EB
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入