Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | 조영필 | - |
dc.date.accessioned | 2021-03-18T07:54:22Z | - |
dc.date.available | 2021-03-18T07:54:22Z | - |
dc.date.issued | 2019-03 | - |
dc.identifier.citation | 2019 Design, Automation & Test in Europe Conference & Exhibition (DATE), page. 908-913 | en_US |
dc.identifier.isbn | 978-3-9819263-2-3 | - |
dc.identifier.issn | 1558-1101 | - |
dc.identifier.issn | 1530-1591 | - |
dc.identifier.uri | https://ieeexplore.ieee.org/document/8714807 | - |
dc.identifier.uri | https://repository.hanyang.ac.kr/handle/20.500.11754/160680 | - |
dc.description.abstract | Attacks on embedded devices are likely to occur any time in unexpected manners. Thus, the defense systems based on fixed sets of rules will easily be subverted by such unexpected, unknown attacks. Learning-based anomaly detection may potentially prevent new unknown zero-day attacks by leveraging the capability of machine learning (ML) to learn the intricate true nature of software hidden within raw information. This paper introduces our work to develop an MPSoC, called RTAD, which can efficiently support in hardware various ML models that run to detect anomalous behaviors on embedded devices in a real-time fashion, and thus enable the devices to counteract the anomalies in the field. In the IoT era, the importance of security for embedded devices cannot be exaggerated because they will become an enticing target for adversaries as they are being integrated into everyday life to provide users with various services. The above-mentioned potential of learning-based detection is believed to benefit those deployed devices under attacks occurring any time during their field operations in unexpected manners. We hereby assume that ML models are trained with runtime branch information as their data features since a sequence of branches serves as a record of control flow transfers during program execution. In fact, there have been numerous ML studies that examine various types of branches in order to infer (or detect) anomaly in branch behaviors that may be induced by diverse attacks that can cause deviant control flow in software. Our goal of real-time anomalous branch behavior inference poses two challenges to our development of RTAD. Firstly, RTAD must collect and transfer in a timely fashion a sequence of branches as the input to the ML model. Secondly, RTAD must be able to promptly process the delivered branch data with the ML model. To tackle these challenges, we have implemented in RTAD two core components: an input generation module and a GPU-inspired ML processing engine. According to our experiments, RTAD enables various ML models to infer anomaly instantly after the victim program behaves aberrantly as the result of attacks being injected into the system. | en_US |
dc.description.sponsorship | This work was partly supported by Institute for Information & communications Technology Promotion(IITP) grant funded by the Korea government(MSIT) (No.2018-0-00230, Development on Autonomous Trust Enhancement Technology of IoT Device and Study on Adaptive IoT Security Open Architecture based on Global Standardization [TrusThingz Project]), (No.2016-0-00078, Cloud based Security Intelligence Technology Development for the Customized Security Service Provisioning) and the National Research Foundation of Korea(NRF) grant funded by the Korea government(MSIT) (NRF-2017R1A2A1A17069478) and NRF grant funded by the Korea government (MSIT) [2018R1A2B3001628]. | en_US |
dc.language.iso | en | en_US |
dc.publisher | IEEE COMPUTER SOC | en_US |
dc.subject | anomaly detection | en_US |
dc.subject | machine learning | en_US |
dc.subject | embedded system | en_US |
dc.subject | runtime security | en_US |
dc.subject | Hardware | en_US |
dc.subject | Data models | en_US |
dc.subject | Real-time systems | en_US |
dc.subject | Runtime | en_US |
dc.subject | Software | en_US |
dc.subject | Engines | en_US |
dc.subject | Anomaly detection | en_US |
dc.title | Real-Time Anomalous Branch Behavior Inference with a GPU-inspired Engine for Machine Learning Models | en_US |
dc.type | Article | en_US |
dc.identifier.doi | 10.23919/DATE.2019.8714807 | - |
dc.relation.page | 1-6 | - |
dc.contributor.googleauthor | Oh, Hyunyoung | - |
dc.contributor.googleauthor | Yi, Hayoon | - |
dc.contributor.googleauthor | Choe, Hyeokjun | - |
dc.contributor.googleauthor | Cho, Yeongpil | - |
dc.contributor.googleauthor | Yoon, Sungroh | - |
dc.contributor.googleauthor | Paek, Yunheung | - |
dc.relation.code | 20190104 | - |
dc.sector.campus | S | - |
dc.sector.daehak | COLLEGE OF ENGINEERING[S] | - |
dc.sector.department | DEPARTMENT OF COMPUTER SCIENCE | - |
dc.identifier.pid | ypcho | - |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.