Securing embedded control systems presents a unique challenge. In addition to the resource restrictions inherent to embedded devices, embedded control systems must accommodate strict, non-negotiable timing requirements, and their massive scale greatly increases other costs such as power consumption. These constraints render conventional host-based intrusion detection – using a hypervisor to create a safe environment under which a monitoring entity can operate – costly and impractical. This paper describes the design and implementation of Autoscopy, an experimental host-based intrusion detection system that operates from within the kernel and leverages its built-in tracing framework to identify control flow anomalies that are often caused by rootkits hijacking kernel hooks. Experimental tests demonstrate that Autoscopy can detect representative control flow hijacking techniques while maintaining a low performance overhead.
CITATION STYLE
Reeves, J., Ramaswamy, A., Locasto, M., Bratus, S., & Smith, S. (2011). Lightweight intrusion detection for resource-constrained embedded control systems. In IFIP Advances in Information and Communication Technology (Vol. 367, pp. 31–46). Springer New York LLC. https://doi.org/10.1007/978-3-642-24864-1_3
Mendeley helps you to discover research relevant for your work.