Detection of Malicious Threats Exploiting Clock-Gating Hardware Using Machine Learning.

Sensors (Basel)

Department of Computer Science, College of Computer Science and Information Systems, Najran University, Najran 61441, Saudi Arabia.

Published: February 2024

Embedded system technologies are increasingly being incorporated into manufacturing, smart grid, industrial control systems, and transportation systems. However, the vast majority of today's embedded platforms lack the support of built-in security features which makes such systems highly vulnerable to a wide range of cyber-attacks. Specifically, they are vulnerable to malware injection code that targets the power distribution system of an ARM Cortex-M-based microcontroller chipset (ARM, Cambridge, UK). Through hardware exploitation of the clock-gating distribution system, an attacker is capable of disabling/activating various subsystems on the chip, compromising the reliability of the system during normal operation. This paper proposes the development of an Intrusion Detection System (IDS) capable of detecting clock-gating malware deployed on ARM Cortex-M-based embedded systems. To enhance the robustness and effectiveness of our approach, we fully implemented, tested, and compared six IDSs, each employing different methodologies. These include IDSs based on K-Nearest Classifier, Random Forest, Logistic Regression, Decision Tree, Naive Bayes, and Stochastic Gradient Descent. Each of these IDSs was designed to identify and categorize various variants of clock-gating malware deployed on the system. We have analyzed the performance of these IDSs in terms of detection accuracy against various types of clock-gating malware injection code. Power consumption data collected from the chipset during normal operation and malware code injection attacks were used for models' training and validation. Our simulation results showed that the proposed IDSs, particularly those based on K-Nearest Classifier and Logistic Regression, were capable of achieving high detection rates, with some reaching a detection rate of 0.99. These results underscore the effectiveness of our IDSs in protecting ARM Cortex-M-based embedded systems against clock-gating malware.

Download full-text PDF

Source
http://www.ncbi.nlm.nih.gov/pmc/articles/PMC10856995PMC
http://dx.doi.org/10.3390/s24030983DOI Listing

Publication Analysis

Top Keywords

clock-gating malware
16
arm cortex-m-based
12
malware injection
8
injection code
8
distribution system
8
normal operation
8
malware deployed
8
cortex-m-based embedded
8
embedded systems
8
idss based
8

Similar Publications

Detection of Malicious Threats Exploiting Clock-Gating Hardware Using Machine Learning.

Sensors (Basel)

February 2024

Department of Computer Science, College of Computer Science and Information Systems, Najran University, Najran 61441, Saudi Arabia.

Embedded system technologies are increasingly being incorporated into manufacturing, smart grid, industrial control systems, and transportation systems. However, the vast majority of today's embedded platforms lack the support of built-in security features which makes such systems highly vulnerable to a wide range of cyber-attacks. Specifically, they are vulnerable to malware injection code that targets the power distribution system of an ARM Cortex-M-based microcontroller chipset (ARM, Cambridge, UK).

View Article and Find Full Text PDF

Want AI Summaries of new PubMed Abstracts delivered to your In-box?

Enter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!