2015
DOI: 10.1016/j.sysarc.2015.07.007
|View full text |Cite
|
Sign up to set email alerts
|

Exploring ICMetrics to detect abnormal program behaviour on embedded devices

Abstract: Abstract-Execution of unknown or malicious software on an embedded system may trigger harmful system behaviour targeted at stealing sensitive data and/or causing damage to the system. It is thus considered a potential and significant threat to the security of embedded systems. Generally, the resource constrained nature of Commercial offthe-shelf (COTS) embedded devices, such as embedded medical equipment, does not allow computationally expensive protection solutions to be deployed on these devices, rendering t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 27 publications
0
3
0
Order By: Relevance
“…Various methods for safeguarding information have been devised, but these solutions often prove incompatible with a multitude of integrated architectures. Their implementation can be hindered by factors such as the device operating system or customized firmware, stringent energy constraints, and severely constrained computing resources [27].…”
Section: Literature Reviewmentioning
confidence: 99%
See 1 more Smart Citation
“…Various methods for safeguarding information have been devised, but these solutions often prove incompatible with a multitude of integrated architectures. Their implementation can be hindered by factors such as the device operating system or customized firmware, stringent energy constraints, and severely constrained computing resources [27].…”
Section: Literature Reviewmentioning
confidence: 99%
“…Therefore, the synchronization challenge revolves around designing an appropriate controller that eliminates the nonlinear and uncommon components while introducing other elements that ensure system stability, Equation (27):…”
Section: Slave Controller-master-slave Synchronizationmentioning
confidence: 99%
“…The antivirus software based on the principle of using a special method to detect the so-called anomalous behavior of programs is worth noting (Zhai et al, 2015). However, this type of antivirus has a drawback: the ability to identify unknown risks and threats is unlikely.…”
Section: Literature Reviewmentioning
confidence: 99%