skip to main content
OSTI.GOV title logo U.S. Department of Energy
Office of Scientific and Technical Information

Title: Detection of counterfeit and compromised devices using system and function call tracing techniques

Abstract

Frameworks, methods, and systems for securing a smart grid are provided. A framework can include data collection, call tracing techniques, and preparing call lists to detect counterfeit or compromised devices. The call tracing techniques can include call tracing and compiling all system and function calls over a time interval. The framework can further include data processing, in which a genuine device is identified and compared to unknown devices. A first statistical correlation can be used for resource-rich systems, and a second statistical correlation can be used for resource-limited systems. Threats of information leakage, measurement poisoning and store-and-send-later can be considered.

Inventors:
; ;
Publication Date:
Research Org.:
The Florida International University Board of Trustees, Miami, FL (United States)
Sponsoring Org.:
USDOE
OSTI Identifier:
1463864
Patent Number(s):
10,027,697
Application Number:
15/581,453
Assignee:
The Florida International University Board of Trustees (Miami, FL)
DOE Contract Number:  
OE0000779
Resource Type:
Patent
Resource Relation:
Patent File Date: 2017 Apr 28
Country of Publication:
United States
Language:
English

Citation Formats

Babun, Leonardo, Aksu, Hidayet, and Uluagac, A. Selcuk. Detection of counterfeit and compromised devices using system and function call tracing techniques. United States: N. p., 2018. Web.
Babun, Leonardo, Aksu, Hidayet, & Uluagac, A. Selcuk. Detection of counterfeit and compromised devices using system and function call tracing techniques. United States.
Babun, Leonardo, Aksu, Hidayet, and Uluagac, A. Selcuk. Tue . "Detection of counterfeit and compromised devices using system and function call tracing techniques". United States. https://www.osti.gov/servlets/purl/1463864.
@article{osti_1463864,
title = {Detection of counterfeit and compromised devices using system and function call tracing techniques},
author = {Babun, Leonardo and Aksu, Hidayet and Uluagac, A. Selcuk},
abstractNote = {Frameworks, methods, and systems for securing a smart grid are provided. A framework can include data collection, call tracing techniques, and preparing call lists to detect counterfeit or compromised devices. The call tracing techniques can include call tracing and compiling all system and function calls over a time interval. The framework can further include data processing, in which a genuine device is identified and compared to unknown devices. A first statistical correlation can be used for resource-rich systems, and a second statistical correlation can be used for resource-limited systems. Threats of information leakage, measurement poisoning and store-and-send-later can be considered.},
doi = {},
journal = {},
number = ,
volume = ,
place = {United States},
year = {2018},
month = {7}
}

Patent:

Save / Share:

Works referenced in this record:

Can EDA combat the rise of electronic counterfeiting?
conference, January 2012

  • Koushanfar, Farinaz; Fazzari, Saverio; McCants, Carl
  • DAC '12 Proceedings of the 49th Annual Design Automation Conference
  • DOI: 10.1145/2228360.2228386

Counterfeit electronics: A rising threat in the semiconductor manufacturing industry
conference, September 2013


Counterfeit Integrated Circuits: A Rising Threat in the Global Semiconductor Supply Chain
journal, August 2014

  • Guin, Ujjwal; Huang, Ke; DiMase, Daniel
  • Proceedings of the IEEE, Vol. 102, Issue 8, p. 1207-1228
  • DOI: 10.1109/JPROC.2014.2332291

Who's in Control of Your Control System? Device Fingerprinting for Cyber-Physical Systems
conference, January 2016


Anti-counterfeit Techniques: From Design to Resign
conference, December 2013

  • Guin, Ujjwal; Forte, Domenic; Tehranipoor, Mohammad
  • 2013 14th International Workshop on Microprocessor Test and Verification
  • DOI: 10.1109/MTV.2013.28

Securing smart grid: cyber attacks, countermeasures, and challenges
journal, August 2012

  • Li, Xu; Liang, Xiaohui; Lu, Rongxing
  • IEEE Communications Magazine, Vol. 50, Issue 8, p. 38-45
  • DOI: 10.1109/MCOM.2012.6257525

A network-based approach to counterfeit detection
conference, November 2013

  • Sathyanarayana, Supreeth; Robinson, William H.; Beyah, Raheem A.
  • 2013 IEEE International Conference on Technologies for Homeland Security (HST)
  • DOI: 10.1109/THS.2013.6699050

Physical layer identification of embedded devices using RF-DNA fingerprinting
conference, October 2010


Cybersecurity Standards: Managing Risk and Creating Resilience
journal, September 2014

  • Collier, Zachary A.; DiMase, Daniel; Walters, Steve
  • Computer, Vol. 47, Issue 9, p. 70-76
  • DOI: 10.1109/MC.2013.448

Modeling system calls for intrusion detection with dynamic window sizes
conference, January 2001

  • Eskin, E.; Lee, Wenke; Stolfo, S. J.
  • Proceedings DARPA Information Survivability Conference and Exposition II. DISCEX'01
  • DOI: 10.1109/DISCEX.2001.932213

Anomaly detection using call stack information
conference, January 2003

  • Feng, H. H.; Kolesnikov, O. M.; Fogla, P.
  • Security and Privacy, 2003. Proceedings. 2003 Symposium on
  • DOI: 10.1109/SECPRI.2003.1199328

NORT: Runtime Anomaly-Based Monitoring of Malicious Behavior for Windows
conference, January 2012

  • Milea, Narcisa Andreea; Khoo, Siau Cheng; Lo, David
  • International Conference on Runtime Verification, p. 115-130
  • DOI: 10.1007/978-3-642-29860-8_10

A fast automaton-based method for detecting anomalous program behaviors
conference, January 2001

  • Sekar, R.; Bendre, M.; Dhurjati, D.
  • Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001
  • DOI: 10.1109/SECPRI.2001.924295

Detection of electronic counterfeit components
conference, May 2015

  • Kanovsky, Andrej; Spanik, Pavol; Frivaldsky, Michal
  • 2015 16th International Scientific Conference on Electric Power Engineering (EPE)
  • DOI: 10.1109/EPE.2015.7161140

An NFC based consumer-level counterfeit detection framework
conference, July 2013

  • Saeed, Muhammad Qasim; Bilal, Zeeshan; Walter, Colin D.
  • 2013 Eleventh Annual Conference on Privacy, Security and Trust
  • DOI: 10.1109/PST.2013.6596047

Counterfeit mobile devices - the duck test
conference, October 2015

  • O’brien, John; Lehtonen, Kimmo
  • 2015 10th International Conference on Malicious and Unwanted Software (MALWARE)
  • DOI: 10.1109/MALWARE.2015.7413695