Power Fingerprinting for Integrity Assessment of Embedded Systems

dc.contributor.authorAguayo Gonzalez, Carlos R.en
dc.contributor.committeechairReed, Jeffrey H.en
dc.contributor.committeememberTranter, William H.en
dc.contributor.committeememberBostian, Charles W.en
dc.contributor.committeememberPark, Jung-Min Jerryen
dc.contributor.committeememberEdwards, Stephen H.en
dc.contributor.departmentElectrical and Computer Engineeringen
dc.date.accessioned2017-04-06T15:44:33Zen
dc.date.adate2012-01-20en
dc.date.available2017-04-06T15:44:33Zen
dc.date.issued2011-12-05en
dc.date.rdate2016-09-27en
dc.date.sdate2011-12-19en
dc.description.abstractThis dissertation introduces Power Fingerprinting (PFP), a novel technique for assessing the execution integrity of embedded devices. A PFP monitor is an external device that captures the dynamic power consumption of a processor using fine-grained measurements at the clock-cycle level and applies anomaly detection techniques to determine whether the integrity of the system has been compromised. PFP uses a set of trusted signatures from the target code that are extracted during a pre-characterization process. PFP provides significant visibility into the internal execution status, making it extremely robust against evasion. Because of its independence and physical separation, PFP prevents attacks on the monitor itself and introduces minimal overhead on platforms with resource constraints. Due to its anomaly detection operation, PFP is effective against unknown (zero-day) attacks. This dissertation demonstrates the feasibility of PFP on different platforms with different configurations and architectural complexities. Experimental results demonstrate the feasibility of PFP in a basic deterministic embedded platform for radio applications in two different areas: security and regulatory certification. For more complex, non-deterministic platforms, this works presents feasibility results for monitoring the execution integrity of complex software on a high-performance Android platform, including the ability to detect a real privilege escalation attack. In addition, the dissertation develops several general techniques to implement and integrate PFP into embedded platforms such as a general monitoring architecture, a methodology to characterize software modules and extract signatures, and an approach to perform board characterization and improve monitoring sensitivity.en
dc.description.degreePh. D.en
dc.identifier.otheretd-12192011-094002en
dc.identifier.sourceurlhttp://scholar.lib.vt.edu/theses/available/etd-12192011-094002/en
dc.identifier.urihttp://hdl.handle.net/10919/77291en
dc.language.isoen_USen
dc.publisherVirginia Techen
dc.rightsIn Copyrighten
dc.rights.urihttp://rightsstatements.org/vocab/InC/1.0/en
dc.subjectembedded systemsen
dc.subjectpattern recognitionen
dc.subjectintrussion detectionen
dc.subjectPower Fingerprintingen
dc.subjectintegrity assessmenten
dc.titlePower Fingerprinting for Integrity Assessment of Embedded Systemsen
dc.typeDissertationen
dc.type.dcmitypeTexten
thesis.degree.disciplineElectrical and Computer Engineeringen
thesis.degree.grantorVirginia Polytechnic Institute and State Universityen
thesis.degree.leveldoctoralen
thesis.degree.namePh. D.en

Files

Original bundle
Now showing 1 - 2 of 2
Loading...
Thumbnail Image
Name:
etd-12192011-094002_Aguayo_CR_D_2011.pdf
Size:
1.9 MB
Format:
Adobe Portable Document Format
Loading...
Thumbnail Image
Name:
etd-12192011-094002_Aguayo_CR_D_2011_Copyright.pdf
Size:
619.92 KB
Format:
Adobe Portable Document Format