Power Measurement Based Code Classification for Programmable Logic Circuits

被引:0
作者
Roy, Tamoghna [1 ]
Beex, A. A. [1 ]
机构
[1] Virginia Tech, DSPRL Wireless VT ECE, Blacksburg, VA 24061 USA
来源
2018 IEEE INTERNATIONAL SYMPOSIUM ON SIGNAL PROCESSING AND INFORMATION TECHNOLOGY (ISSPIT) | 2018年
基金
美国国家科学基金会;
关键词
Physical Layer Security; Machine Learning; Power Fingerprinting;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Traditional cyber security and monitoring systems rely on prior knowledge about possible attacks, which renders them ineffective against novel schemes (zero-day attacks). Moreover, intruders are targeting different types of devices (e.g. Programmable Logic Circuits/Controllers (PLC)) for which traditional security systems are unavailable. A solution to this problem is provided by analysis of the power consumption behavior of a system and relating power consumption characteristics to behavior internal to the device. In this work, a detection system is developed which is capable of discriminating between different codes executed by the target device, a PLC, based on passive measurement at the external power supply point; this is unlike previous methods, which relied on a specific sensor located directly over the chip. Results show that for a PLC, which is executing four different codes, the classification system can discriminate with very high accuracy (> 99%).
引用
收藏
页码:644 / 648
页数:5
相关论文
共 11 条
[1]  
[Anonymous], 1999, ANN INT CRYPT C
[2]  
Boser B., TRAINING ALGORITHM O, P144
[3]   LIBSVM: A Library for Support Vector Machines [J].
Chang, Chih-Chung ;
Lin, Chih-Jen .
ACM TRANSACTIONS ON INTELLIGENT SYSTEMS AND TECHNOLOGY, 2011, 2 (03)
[4]  
CORTES C, 1995, MACH LEARN, V20, P273, DOI 10.1023/A:1022627411411
[5]  
Gonzalez C.R. A., 2009, MILCOM 2009-2009 IEEE Military Communications Conference, P1
[6]   Power fingerprinting in SDR integrity assessment for security and regulatory compliance [J].
Gonzalez, Carlos R. Aguayo ;
Reed, Jeffrey H. .
ANALOG INTEGRATED CIRCUITS AND SIGNAL PROCESSING, 2011, 69 (2-3) :307-327
[7]   DETECTING UNAUTHORIZED SOFTWARE EXECUTION IN SDR USING POWER FINGERPRINTING [J].
Gonzalez, Carlos R. Aguayo ;
Reed, Jeffrey H. .
MILITARY COMMUNICATIONS CONFERENCE, 2010 (MILCOM 2010), 2010, :2211-2216
[8]  
Mangard S., 2007, POWER ANAL ATTACKS R
[9]   Power analysis attacks and countermeasures [J].
Popp, Thomas ;
Mangard, Stefan ;
Oswald, Elisabeth .
IEEE DESIGN & TEST OF COMPUTERS, 2007, 24 (06) :535-543
[10]  
Schölkopf B, 1999, ADVANCES IN KERNEL METHODS, P327