A Hardware-Based Architecture-Neutral Framework for Real-Time IoT Workload Forensics

被引:5
作者
Zhou, Liwei [1 ]
Hu, Yang [2 ]
Makris, Yiorgos [3 ]
机构
[1] Univ Texas Dallas, Elect & Comp Engn, Richardson, TX 75080 USA
[2] Univ Texas Dallas, Erik Jonsson Sch Engn & Comp Sci, Elect & Comp Engn, Richardson, TX 75080 USA
[3] UT Dallas, Elect & Comp Engn, Richardson, TX 75080 USA
基金
美国国家科学基金会;
关键词
Hardware; Forensics; Software; Internet of Things; Feature extraction; Runtime; Security; Hardware-based; forensics; machine learning; security;
D O I
10.1109/TC.2020.3000237
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Beneath the potential benefits of the rapidly growing Internet of Things (IoT) technology lurk security risks. In this article, we propose a hardware-based generic framework for IoT workload forensics, an infrastructural technique to securely monitor and ensure delivered IoT services in accordance with specifications and regulatory compliance. In particular, this technique identifies digital workloads being executed in real time through dynamic program behavior modeling based on architecture-level data, fulfilled by dedicated machine learning hardware, without the intervention of high-level software, e.g., the OS and/or the hypervisor. In contrast to the conventional software-based solutions, whose effectiveness may be undermined by software attacks, and which introduce significant runtime overhead, a hardware-based framework enables a secure, prompt and non-intrusive solution. The proposed framework was evaluated on Zedboard, a Zynq-7000 FPGA embedding an ARM Cortex-A9 core. Experimental results using Mibench workload benchmark reveal an average workload identification accuracy of 96.37 percent with insignificant area/power overhead.
引用
收藏
页码:1668 / 1680
页数:13
相关论文
共 36 条
  • [1] ARM, Coresight components technical reference manual
  • [2] LEARNING LONG-TERM DEPENDENCIES WITH GRADIENT DESCENT IS DIFFICULT
    BENGIO, Y
    SIMARD, P
    FRASCONI, P
    [J]. IEEE TRANSACTIONS ON NEURAL NETWORKS, 1994, 5 (02): : 157 - 166
  • [3] Bidmeshki MM, 2016, PR IEEE COMP DESIGN, P153, DOI 10.1109/ICCD.2016.7753274
  • [4] Chollet Francois, 2015, Keras
  • [5] Semantics-Based Online Malware Detection: Towards Efficient Real-Time Protection Against Malware
    Das, Sanjeev
    Liu, Yang
    Zhang, Wei
    Chandramohan, Mahintham
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (02) : 289 - 302
  • [6] Demme J., 2013, 40 ANN INT S COMP AR, P559, DOI 10.1145/2485922
  • [7] Dolan-Gavitt B, 2009, CCS'09: PROCEEDINGS OF THE 16TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P566
  • [8] Dong K, 2014, Obesity Interventions in Underserved Communities: Evidence and Directions, P106
  • [9] Faiedh H, 2001, INT C MICROELECTRON, P189
  • [10] Space Traveling across VM: Automatically Bridging the Semantic Gap in Virtual Machine Introspection via Online Kernel Data Redirection
    Fu, Yangchun
    Lin, Zhiqiang
    [J]. 2012 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2012, : 586 - 600