2015 IEEE 39th Annual Computer Software and Applications Conference 2015
DOI: 10.1109/compsac.2015.89
|View full text |Cite
|
Sign up to set email alerts
|

Runtime Anomaly Detection in Embedded Systems by Binary Tracing and Hidden Markov Models

Abstract: Embedded computing systems are very vulnerable to anomalies that can occur during execution of deployed software. Anomalies can be due for example to faults, bugs or deadlocks during executions. These anomalies can have very dangerous consequences on the systems controlled by embedded computing devices. Embedded systems are designed to perform autonomously, i.e. without any human intervention, and thus the\ud possibility to debug an application to manage the anomaly is very difficult if not impossible. Anomaly… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2016
2016
2020
2020

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(1 citation statement)
references
References 21 publications
0
1
0
Order By: Relevance
“…However, this method which determines outliers as anomalies can only detect point anomalies. Maxion and Tan [23] and Cuzzocrea et al [24] use the Markov detector to detect the security state of the embedded system. is method constructs a Markov matrix based on transition probability of the state sequence.…”
Section: Related Workmentioning
confidence: 99%
“…However, this method which determines outliers as anomalies can only detect point anomalies. Maxion and Tan [23] and Cuzzocrea et al [24] use the Markov detector to detect the security state of the embedded system. is method constructs a Markov matrix based on transition probability of the state sequence.…”
Section: Related Workmentioning
confidence: 99%