Skip to main content
Kent Academic Repository

Detecting Compromised Programs for Embedded System Applications: 27th International Conference, Lübeck, Germany, February 25-28, 2014. Proceedings

Zhai, Xiaojun and Appiah, Kofi and Ehsan, Shoaib and Cheung, Wah M. and Howells, Gareth and Hu, Huosheng and Gu, Dongbing and McDonald-Maier, Klaus D. (2014) Detecting Compromised Programs for Embedded System Applications: 27th International Conference, Lübeck, Germany, February 25-28, 2014. Proceedings. In: Architecture of Computing Systems – ARCS 2014 27th International Conference. Lecture Notes in Computer Science . Springer, Cham, Switzerland, pp. 221-232. ISBN 978-3-319-04890-1. E-ISBN 978-3-319-04891-8. (doi:10.1007/978-3-319-04891-8_19) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:41366)

The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided.
Official URL:
http://dx.doi.org/10.1007/978-3-319-04891-8_19

Abstract

This paper proposes an approach for detecting compromised programs by analysing suitable features from an embedded system. Features used in this paper are the performance variance and actual program counter values of the embedded processor extracted during program execution. “Cycles per Instruction” is used as pre-processing block before the features are classified using a Self-Organizing Map. Experimental results demonstrate the validity of the proposed approach on detecting some common changes such as deletion, insertion and substitution of programs. Overall, correct detection rate for our system is above 90.9% for tested programs.

Item Type: Book section
DOI/Identification number: 10.1007/978-3-319-04891-8_19
Subjects: T Technology
Divisions: Divisions > Division of Computing, Engineering and Mathematical Sciences > School of Engineering and Digital Arts
Depositing User: Tina Thompson
Date Deposited: 10 Jun 2014 08:26 UTC
Last Modified: 17 Aug 2022 10:57 UTC
Resource URI: https://kar.kent.ac.uk/id/eprint/41366 (The current URI for this page, for reference purposes)

University of Kent Author Information

  • Depositors only (login required):

Total unique views for this document in KAR since July 2020. For more details click on the image.