Visible to the public Time and Sequence Integrated Runtime Anomaly Detection for Embedded Systems

TitleTime and Sequence Integrated Runtime Anomaly Detection for Embedded Systems
Publication TypeJournal Article
Year of Publication2017
AuthorsLu, Sixing, Lysecky, Roman
JournalACM Trans. Embed. Comput. Syst.
Volume17
Pagination38:1–38:27
ISSN1539-9087
Keywordsanomaly detection, composability, defense, embedded system security, medical device security, Metrics, pubcrawl, Resiliency, software security, timing based detection, Zero day attacks
Abstract

Network-connected embedded systems grow on a large scale as a critical part of Internet of Things, and these systems are under the risk of increasing malware. Anomaly-based detection methods can detect malware in embedded systems effectively and provide the advantage of detecting zero-day exploits relative to signature-based detection methods, but existing approaches incur significant performance overheads and are susceptible to mimicry attacks. In this article, we present a formal runtime security model that defines the normal system behavior including execution sequence and execution timing. The anomaly detection method in this article utilizes on-chip hardware to non-intrusively monitor system execution through trace port of the processor and detect malicious activity at runtime. We further analyze the properties of the timing distribution for control flow events, and select subset of monitoring targets by three selection metrics to meet hardware constraint. The designed detection method is evaluated by a network-connected pacemaker benchmark prototyped in FPGA and simulated in SystemC, with several mimicry attacks implemented at different levels. The resulting detection rate and false positive rate considering constraints on the number of monitored events supported in the on-chip hardware demonstrate good performance of our approach.

URLhttps://dl.acm.org/citation.cfm?doid=3160927.3122785
DOI10.1145/3122785
Citation Keylu_time_2017