Microsystem Identification and Fingerprinting Using RF Side Channels
@inproceedings{Cleveland2019MicrosystemIA, title={Microsystem Identification and Fingerprinting Using RF Side Channels}, author={Corey Cleveland and M. Chilenski and I. Dekine and P. Kumar and G. Raz}, year={2019} }
We have developed a comprehensive cyber sensor system for fingerprinting many classes of embedded devices, their internal hardware settings, and elements of their code. This is done by detecting changes to programmable embedded devices which impart unique signatures in their involuntary radio frequency (RF) emissions. In this paper, we show results of our approach for the following: i) device identification, ii) peripheral connection status , iii) compiler options used, and iv) data processing… Expand
Figures, Tables, and Topics from this paper
2 Citations
Identifying class of previously unseen programs using RF side channels
- Computer Science, Engineering
- Defense + Commercial Sensing
- 2020
References
SHOWING 1-10 OF 13 REFERENCES
GTID: A Technique for Physical Device and Device Type Fingerprinting
- Computer Science
- IEEE Transactions on Dependable and Secure Computing
- 2015
- 98
Physical layer identification of embedded devices using RF-DNA fingerprinting
- Engineering
- 2010 - MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE
- 2010
- 71
- PDF
Detecting malicious inclusions in secure hardware: Challenges and solutions
- Engineering, Computer Science
- 2008 IEEE International Workshop on Hardware-Oriented Security and Trust
- 2008
- 297
- PDF
Radio-frequency-based anomaly detection for programmable logic controllers in the critical infrastructure
- Engineering, Computer Science
- Int. J. Crit. Infrastructure Prot.
- 2012
- 27
- PDF
Control flow graph modifications for improved RF-based processor tracking performance
- Computer Science, Engineering
- Defense + Security
- 2018
- 5
- PDF
A Primer on Hardware Security: Models, Methods, and Metrics
- Engineering, Computer Science
- Proceedings of the IEEE
- 2014
- 348
- PDF
One Class Support Vector Machines for Detecting Anomalous Windows Registry Accesses
- Computer Science
- 2003
- 166
- PDF
A Survey of Hardware Trojan Taxonomy and Detection
- Engineering, Computer Science
- IEEE Design & Test of Computers
- 2010
- 991
- PDF