Anomalous path detection with hardware support
- 24 September 2005
- proceedings article
- Published by Association for Computing Machinery (ACM)
Abstract
Embedded systems are being deployed as a part of critical infrastructures and are vulnerable to malicious attacks due to internet accessibility. Intrusion detection systems have been proposed to protect computer systems from unauthorized penetration. Detecting an attack early on pays off since further damage is avoided and in some cases, resilient recovery could be adopted. This is especially important for embedded systems deployed in critical infrastructures such as Power Grids etc. where a timely intervention could save catastrophes. An intrusion detection system monitors dynamic program behavior against normal program behavior and raises an alert when an anomaly is detected. The normal behavior is learnt by the system through training and profiling.However, all current intrusion detection systems are purely software based and thus suffer from large performance degradation due to constant monitoring operations inserted in application code. Due to the potential performance overheads, software based solutions cannot monitor program behavior at a very fine level of granularity, thus leaving potential security holes as shown in the literature. Another important drawback of such methods is that they are unable to detect intrusions in near real time and the time lag could prove disastrous in real time embedded systems. In this paper, we propose a hardware-based approach to verify program execution paths of target applications dynamically and to detect anomalous executions. With hardware support, our approach offers multiple advantages over software based solutions including minor performance degradation, much stronger detection capability (a larger variety of attacks get detected) and zero-latency reaction upon an anomaly for near real time detection and thus much better security.Keywords
This publication has 7 references indexed in Scilit:
- Gray-box extraction of execution graphs for anomaly detectionPublished by Association for Computing Machinery (ACM) ,2004
- Secure program execution via dynamic information flow trackingPublished by Association for Computing Machinery (ACM) ,2004
- Timestamped whole program path representation and its applicationsPublished by Association for Computing Machinery (ACM) ,2001
- Architectural support for copy and tamper resistant softwarePublished by Association for Computing Machinery (ACM) ,2000
- Whole program pathsPublished by Association for Computing Machinery (ACM) ,1999
- Intrusion detection via system call tracesIEEE Software, 1997
- Test data generation and feasible path analysisPublished by Association for Computing Machinery (ACM) ,1994