Lightweight intrusion detection for resource-constrained embedded control systems

6Citations
Citations of this article
14Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

Securing embedded control systems presents a unique challenge. In addition to the resource restrictions inherent to embedded devices, embedded control systems must accommodate strict, non-negotiable timing requirements, and their massive scale greatly increases other costs such as power consumption. These constraints render conventional host-based intrusion detection – using a hypervisor to create a safe environment under which a monitoring entity can operate – costly and impractical. This paper describes the design and implementation of Autoscopy, an experimental host-based intrusion detection system that operates from within the kernel and leverages its built-in tracing framework to identify control flow anomalies that are often caused by rootkits hijacking kernel hooks. Experimental tests demonstrate that Autoscopy can detect representative control flow hijacking techniques while maintaining a low performance overhead.

Cite

CITATION STYLE

APA

Reeves, J., Ramaswamy, A., Locasto, M., Bratus, S., & Smith, S. (2011). Lightweight intrusion detection for resource-constrained embedded control systems. In IFIP Advances in Information and Communication Technology (Vol. 367, pp. 31–46). Springer New York LLC. https://doi.org/10.1007/978-3-642-24864-1_3

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free