Hdl Handle:
http://hdl.handle.net/10545/620816
Title:
Detecting compromised programs for embedded system applications
Authors:
Zhai, Xiaojun ( 0000-0002-1030-8311 ) ; Appiah, Kofi ( 0000-0002-9480-0679 ) ; Ehsan, Shoaib; Cheung, Wah M; Howells, Gareth; Hu, Huosheng ( 0000-0001-5797-1412 ) ; Gu, Dongbing; McDonald-Maier, Klaus
Abstract:
This paper proposes an approach for detecting compromised programs by analysing suitable features from an embedded system. Features used in this paper are the performance variance and actual program counter values of the embedded processor extracted during program execution. "Cycles per- Instruction" is used as pre-processing block before the features are classified using a Self-Organising Map. Experimental results demonstrate the validity of the proposed approach on detecting some common changes such as deletion, insertion and substitution of programs. Overall, correct detection rate for our system is above 90.9% for tested programs.
Affiliation:
University of Derby; University of Essex
Citation:
Zhai, X., (2014) 'Detecting compromised programs for embedded system applications', Proceedings of the 27th International Conference on Architecture of Computing Systems -- ARCS 2014, Lübeck, Germany, 25-28 February
Publisher:
Springer
Journal:
Proceedings of the 27th International Conference on Architecture of Computing Systems -- ARCS 2014
Issue Date:
25-Feb-2014
URI:
http://hdl.handle.net/10545/620816
Additional Links:
http://www.arcs2014.iti.uni-luebeck.de/; http://www.springer.com/us/book/9783319048901
Type:
Book chapter
Language:
en
ISBN:
9783319048901
Appears in Collections:
Department of Electronics, Computing & Maths

Full metadata record

DC FieldValue Language
dc.contributor.authorZhai, Xiaojunen
dc.contributor.authorAppiah, Kofien
dc.contributor.authorEhsan, Shoaiben
dc.contributor.authorCheung, Wah Men
dc.contributor.authorHowells, Garethen
dc.contributor.authorHu, Huoshengen
dc.contributor.authorGu, Dongbingen
dc.contributor.authorMcDonald-Maier, Klausen
dc.date.accessioned2016-11-11T16:38:36Z-
dc.date.available2016-11-11T16:38:36Z-
dc.date.issued2014-02-25-
dc.identifier.citationZhai, X., (2014) 'Detecting compromised programs for embedded system applications', Proceedings of the 27th International Conference on Architecture of Computing Systems -- ARCS 2014, Lübeck, Germany, 25-28 Februaryen
dc.identifier.isbn9783319048901-
dc.identifier.urihttp://hdl.handle.net/10545/620816-
dc.description.abstractThis paper proposes an approach for detecting compromised programs by analysing suitable features from an embedded system. Features used in this paper are the performance variance and actual program counter values of the embedded processor extracted during program execution. "Cycles per- Instruction" is used as pre-processing block before the features are classified using a Self-Organising Map. Experimental results demonstrate the validity of the proposed approach on detecting some common changes such as deletion, insertion and substitution of programs. Overall, correct detection rate for our system is above 90.9% for tested programs.en
dc.language.isoenen
dc.publisherSpringeren
dc.relation.urlhttp://www.arcs2014.iti.uni-luebeck.de/en
dc.relation.urlhttp://www.springer.com/us/book/9783319048901en
dc.subjectICMetricsen
dc.subjectSignal Processingen
dc.subjectSelf-organising mapen
dc.subjectEmbedded systemsen
dc.titleDetecting compromised programs for embedded system applicationsen
dc.typeBook chapteren
dc.contributor.departmentUniversity of Derbyen
dc.contributor.departmentUniversity of Essexen
dc.identifier.journalProceedings of the 27th International Conference on Architecture of Computing Systems -- ARCS 2014en
All Items in UDORA are protected by copyright, with all rights reserved, unless otherwise indicated.