2012
DOI: 10.1109/les.2012.2218630
|View full text |Cite
|
Sign up to set email alerts
|

Hardware-Assisted Detection of Malicious Software in Embedded Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
35
0

Year Published

2014
2014
2020
2020

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 54 publications
(35 citation statements)
references
References 5 publications
0
35
0
Order By: Relevance
“…In [17], Kolbitsch et al proposed a malware detection system to complement conventional AV software by matching automatically generated behaviour models against the runtime behaviour of unknown programs. Similar to [1], Rahmatian et al [5] used a CFG to detect intrusion for secured embedded systems by detecting behavioural differences between the correct system and malware. In their system, each executing process is associated with a finite state machine (FSM) that recognizes the sequences of system calls generated by the correct program.…”
Section: Related Workmentioning
confidence: 99%
See 4 more Smart Citations
“…In [17], Kolbitsch et al proposed a malware detection system to complement conventional AV software by matching automatically generated behaviour models against the runtime behaviour of unknown programs. Similar to [1], Rahmatian et al [5] used a CFG to detect intrusion for secured embedded systems by detecting behavioural differences between the correct system and malware. In their system, each executing process is associated with a finite state machine (FSM) that recognizes the sequences of system calls generated by the correct program.…”
Section: Related Workmentioning
confidence: 99%
“…The limitations with the use of system calls for program identification [1], [5] have been pointed out in [15] and are more prevalent in embedded systems settings, which typically to not employ operating systems. The mentioned limitations are: 1) Programs with little or no system calls such as programs solely based on arithmetic operation, and 2) Programs which do not have unique system call behaviours may fail to exhibit a birthmark.…”
Section: Related Workmentioning
confidence: 99%
See 3 more Smart Citations