Control flow graph modifications for improved RF-based processor tracking performance

@inproceedings{Chilenski2018ControlFG,
  title={Control flow graph modifications for improved RF-based processor tracking performance},
  author={M. Chilenski and G. Cybenko and I. Dekine and P. Kumar and G. Raz},
  booktitle={Defense + Security},
  year={2018}
}
  • M. Chilenski, G. Cybenko, +2 authors G. Raz
  • Published in Defense + Security 2018
  • Computer Science, Engineering
  • Many dedicated embedded processors do not have memory or computational resources to coexist with traditional (host-based) security solutions. As a result, there is interest in using out-of-band analog side-channel measurements and their analyses to accurately monitor and analyze expected program execution. In this paper, we describe an approach to this problem using externally observable multi-band radio frequency (RF) measurements to make inferences about a program’s execution. Because it is… CONTINUE READING
    5 Citations
    Identifying class of previously unseen programs using RF side channels
    Microsystem Identification and Fingerprinting Using RF Side Channels
    • 2
    • PDF
    Observability Properties of Colored Graphs
    • 3
    • PDF
    Analytic Properties of Trackable Weak Models
    • 1
    • PDF

    References

    SHOWING 1-10 OF 12 REFERENCES
    Increasing the size of atomic instruction blocks using control flow assertions
    • 31
    • PDF
    The theory of trackability with applications to sensor networks
    • 34
    • PDF
    Observable graphs
    • 9
    • PDF
    Design And Analysis Of Modern Tracking Systems
    • 772
    Distance measures for nonparametric weak process models
    • Y. Sheng, George Cybenko
    • Mathematics, Computer Science
    • 2005 IEEE International Conference on Systems, Man and Cybernetics
    • 2005
    • 12
    A Tutorial on Hidden Markov Models and Selected Applications
    • 23,923
    • PDF
    Large-scale Analogue Measurements and Analysis for Cyber-Security
    • 4
    Leveraging the analog domain for security (LADS).
    • https://www.darpa.mil/program/ leveraging-the-analog-domain-for-security
    • 2015