• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

利用机器学习检测利用时钟门控硬件的恶意威胁

Detection of Malicious Threats Exploiting Clock-Gating Hardware Using Machine Learning.

作者信息

Kose Nuri Alperen, Jinad Razaq, Rasheed Amar, Shashidhar Narasimha, Baza Mohamed, Alshahrani Hani

机构信息

Department of Computer Science, Sam Houston State University, Huntsville, TX 77340, USA.

Department of Computer Science, College of Charleston, Charleston, SC 29424, USA.

出版信息

Sensors (Basel). 2024 Feb 2;24(3):983. doi: 10.3390/s24030983.

DOI:10.3390/s24030983
PMID:38339700
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC10856995/
Abstract

Embedded system technologies are increasingly being incorporated into manufacturing, smart grid, industrial control systems, and transportation systems. However, the vast majority of today's embedded platforms lack the support of built-in security features which makes such systems highly vulnerable to a wide range of cyber-attacks. Specifically, they are vulnerable to malware injection code that targets the power distribution system of an ARM Cortex-M-based microcontroller chipset (ARM, Cambridge, UK). Through hardware exploitation of the clock-gating distribution system, an attacker is capable of disabling/activating various subsystems on the chip, compromising the reliability of the system during normal operation. This paper proposes the development of an Intrusion Detection System (IDS) capable of detecting clock-gating malware deployed on ARM Cortex-M-based embedded systems. To enhance the robustness and effectiveness of our approach, we fully implemented, tested, and compared six IDSs, each employing different methodologies. These include IDSs based on K-Nearest Classifier, Random Forest, Logistic Regression, Decision Tree, Naive Bayes, and Stochastic Gradient Descent. Each of these IDSs was designed to identify and categorize various variants of clock-gating malware deployed on the system. We have analyzed the performance of these IDSs in terms of detection accuracy against various types of clock-gating malware injection code. Power consumption data collected from the chipset during normal operation and malware code injection attacks were used for models' training and validation. Our simulation results showed that the proposed IDSs, particularly those based on K-Nearest Classifier and Logistic Regression, were capable of achieving high detection rates, with some reaching a detection rate of 0.99. These results underscore the effectiveness of our IDSs in protecting ARM Cortex-M-based embedded systems against clock-gating malware.

摘要

嵌入式系统技术正越来越多地被应用于制造业、智能电网、工业控制系统和交通系统。然而,当今绝大多数嵌入式平台缺乏内置安全功能的支持,这使得此类系统极易受到各种网络攻击。具体而言,它们容易受到针对基于ARM Cortex-M的微控制器芯片组(ARM,英国剑桥)配电系统的恶意软件注入代码的攻击。通过对时钟门控分配系统进行硬件利用,攻击者能够禁用/激活芯片上的各种子系统,从而在正常运行期间损害系统的可靠性。本文提出开发一种入侵检测系统(IDS),该系统能够检测部署在基于ARM Cortex-M的嵌入式系统上的时钟门控恶意软件。为了提高我们方法的鲁棒性和有效性,我们全面实现、测试并比较了六种IDS,每种IDS采用不同的方法。这些方法包括基于K最近邻分类器、随机森林、逻辑回归、决策树、朴素贝叶斯和随机梯度下降的IDS。这些IDS中的每一个都旨在识别和分类部署在系统上的时钟门控恶意软件的各种变体。我们根据针对各种类型的时钟门控恶意软件注入代码的检测准确率分析了这些IDS的性能。在正常运行期间从芯片组收集的功耗数据以及恶意软件代码注入攻击数据被用于模型的训练和验证。我们的模拟结果表明,所提出的IDS,特别是那些基于K最近邻分类器和逻辑回归的IDS,能够实现高检测率,有些检测率达到了0.99。这些结果强调了我们的IDS在保护基于ARM Cortex-M的嵌入式系统免受时钟门控恶意软件攻击方面的有效性。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/5493/10856995/b14df3657d30/sensors-24-00983-g015.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/5493/10856995/0893ee07f925/sensors-24-00983-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/5493/10856995/1f5b5bee644b/sensors-24-00983-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/5493/10856995/7ac05f44334e/sensors-24-00983-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/5493/10856995/6621845ffee6/sensors-24-00983-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/5493/10856995/ede0940b49f3/sensors-24-00983-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/5493/10856995/19ce4b152e7d/sensors-24-00983-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/5493/10856995/c128832c852f/sensors-24-00983-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/5493/10856995/aa68a3cbf667/sensors-24-00983-g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/5493/10856995/9a529655f848/sensors-24-00983-g009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/5493/10856995/954edd2ee6f1/sensors-24-00983-g010.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/5493/10856995/674563a13e75/sensors-24-00983-g011.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/5493/10856995/ea2f89dd3a49/sensors-24-00983-g012.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/5493/10856995/c7afabfa2ce6/sensors-24-00983-g013.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/5493/10856995/75930045f7de/sensors-24-00983-g014.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/5493/10856995/b14df3657d30/sensors-24-00983-g015.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/5493/10856995/0893ee07f925/sensors-24-00983-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/5493/10856995/1f5b5bee644b/sensors-24-00983-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/5493/10856995/7ac05f44334e/sensors-24-00983-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/5493/10856995/6621845ffee6/sensors-24-00983-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/5493/10856995/ede0940b49f3/sensors-24-00983-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/5493/10856995/19ce4b152e7d/sensors-24-00983-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/5493/10856995/c128832c852f/sensors-24-00983-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/5493/10856995/aa68a3cbf667/sensors-24-00983-g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/5493/10856995/9a529655f848/sensors-24-00983-g009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/5493/10856995/954edd2ee6f1/sensors-24-00983-g010.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/5493/10856995/674563a13e75/sensors-24-00983-g011.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/5493/10856995/ea2f89dd3a49/sensors-24-00983-g012.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/5493/10856995/c7afabfa2ce6/sensors-24-00983-g013.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/5493/10856995/75930045f7de/sensors-24-00983-g014.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/5493/10856995/b14df3657d30/sensors-24-00983-g015.jpg

相似文献

1
Detection of Malicious Threats Exploiting Clock-Gating Hardware Using Machine Learning.利用机器学习检测利用时钟门控硬件的恶意威胁
Sensors (Basel). 2024 Feb 2;24(3):983. doi: 10.3390/s24030983.
2
A stacked deep learning approach to cyber-attacks detection in industrial systems: application to power system and gas pipeline systems.一种用于工业系统中网络攻击检测的堆叠深度学习方法:在电力系统和天然气管道系统中的应用。
Cluster Comput. 2022;25(1):561-578. doi: 10.1007/s10586-021-03426-w. Epub 2021 Oct 5.
3
An Insight into the Machine-Learning-Based Fileless Malware Detection.基于机器学习的无文件恶意软件检测的深入分析。
Sensors (Basel). 2023 Jan 5;23(2):612. doi: 10.3390/s23020612.
4
Detection of Android Malware in the Internet of Things through the K-Nearest Neighbor Algorithm.通过K近邻算法检测物联网中的安卓恶意软件。
Sensors (Basel). 2023 Aug 18;23(16):7256. doi: 10.3390/s23167256.
5
Randomized Prediction Games for Adversarial Machine Learning.对抗机器学习的随机预测游戏。
IEEE Trans Neural Netw Learn Syst. 2017 Nov;28(11):2466-2478. doi: 10.1109/TNNLS.2016.2593488.
6
Enhancing Cyber-Resilience for Small and Medium-Sized Organizations with Prescriptive Malware Analysis, Detection and Response.通过规范性恶意软件分析、检测和响应增强中小型组织的网络弹性。
Sensors (Basel). 2023 Jul 28;23(15):6757. doi: 10.3390/s23156757.
7
Windows malware detection based on static analysis with multiple features.基于多特征静态分析的Windows恶意软件检测
PeerJ Comput Sci. 2023 Apr 21;9:e1319. doi: 10.7717/peerj-cs.1319. eCollection 2023.
8
Evaluation of Machine Learning Algorithms for Malware Detection.机器学习算法在恶意软件检测中的评估。
Sensors (Basel). 2023 Jan 13;23(2):946. doi: 10.3390/s23020946.
9
EIFDAA: Evaluation of an IDS with function-discarding adversarial attacks in the IIoT.EIFDAA:工业物联网中具有功能丢弃对抗攻击的入侵检测系统评估
Heliyon. 2023 Feb 9;9(2):e13520. doi: 10.1016/j.heliyon.2023.e13520. eCollection 2023 Feb.
10
A Malware Distribution Simulator for the Verification of Network Threat Prevention Tools.用于验证网络威胁预防工具的恶意软件传播模拟器
Sensors (Basel). 2021 Oct 21;21(21):6983. doi: 10.3390/s21216983.

本文引用的文献

1
CANAttack: Assessing Vulnerabilities within Controller Area Network.CAN攻击:评估控制器局域网内的漏洞
Sensors (Basel). 2023 Oct 2;23(19):8223. doi: 10.3390/s23198223.