DOE Patents title logo U.S. Department of Energy
Office of Scientific and Technical Information

Title: Detection of counterfeit and compromised devices using system and function call tracing techniques

Abstract

Frameworks, methods, and systems for securing a smart grid are provided. A framework can include data collection, call tracing techniques, and preparing call lists to detect counterfeit or compromised devices. The call tracing techniques can include call tracing and compiling all system and function calls over a time interval. The framework can further include data processing, in which a genuine device is identified and compared to unknown devices. A first statistical correlation can be used for resource-rich systems, and a second statistical correlation can be used for resource-limited systems. Threats of information leakage, measurement poisoning and store-and-send-later can be considered.

Inventors:
; ;
Issue Date:
Research Org.:
The Florida International University Board of Trustees, Miami, FL (United States)
Sponsoring Org.:
USDOE
OSTI Identifier:
1463864
Patent Number(s):
10027697
Application Number:
15/581,453
Assignee:
The Florida International University Board of Trustees (Miami, FL)
Patent Classifications (CPCs):
Y - NEW / CROSS SECTIONAL TECHNOLOGIES Y04 - INFORMATION OR COMMUNICATION TECHNOLOGIES HAVING AN IMPACT ON OTHER TECHNOLOGY AREAS Y04S - SYSTEMS INTEGRATING TECHNOLOGIES RELATED TO POWER NETWORK OPERATION, COMMUNICATION OR INFORMATION TECHNOLOGIES FOR IMPROVING THE ELECTRICAL POWER GENERATION, TRANSMISSION, DISTRIBUTION, MANAGEMENT OR USAGE, i.e. SMART GRIDS
H - ELECTRICITY H04 - ELECTRIC COMMUNICATION TECHNIQUE H04L - TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
DOE Contract Number:  
OE0000779
Resource Type:
Patent
Resource Relation:
Patent File Date: 2017 Apr 28
Country of Publication:
United States
Language:
English

Citation Formats

Babun, Leonardo, Aksu, Hidayet, and Uluagac, A. Selcuk. Detection of counterfeit and compromised devices using system and function call tracing techniques. United States: N. p., 2018. Web.
Babun, Leonardo, Aksu, Hidayet, & Uluagac, A. Selcuk. Detection of counterfeit and compromised devices using system and function call tracing techniques. United States.
Babun, Leonardo, Aksu, Hidayet, and Uluagac, A. Selcuk. Tue . "Detection of counterfeit and compromised devices using system and function call tracing techniques". United States. https://www.osti.gov/servlets/purl/1463864.
@article{osti_1463864,
title = {Detection of counterfeit and compromised devices using system and function call tracing techniques},
author = {Babun, Leonardo and Aksu, Hidayet and Uluagac, A. Selcuk},
abstractNote = {Frameworks, methods, and systems for securing a smart grid are provided. A framework can include data collection, call tracing techniques, and preparing call lists to detect counterfeit or compromised devices. The call tracing techniques can include call tracing and compiling all system and function calls over a time interval. The framework can further include data processing, in which a genuine device is identified and compared to unknown devices. A first statistical correlation can be used for resource-rich systems, and a second statistical correlation can be used for resource-limited systems. Threats of information leakage, measurement poisoning and store-and-send-later can be considered.},
doi = {},
journal = {},
number = ,
volume = ,
place = {United States},
year = {2018},
month = {7}
}

Works referenced in this record:

Counterfeit Integrated Circuits: A Rising Threat in the Global Semiconductor Supply Chain
journal, August 2014


Can EDA combat the rise of electronic counterfeiting?
conference, January 2012


Detection of electronic counterfeit components
conference, May 2015


Hardware Security Through Chain Assurance
conference, January 2016


An NFC based consumer-level counterfeit detection framework
conference, July 2013


Counterfeit electronics: A rising threat in the semiconductor manufacturing industry
conference, September 2013


NORT: Runtime Anomaly-Based Monitoring of Malicious Behavior for Windows
conference, January 2012


Securing smart grid: cyber attacks, countermeasures, and challenges
journal, August 2012


Cybersecurity Standards: Managing Risk and Creating Resilience
journal, September 2014


Anti-counterfeit Techniques: From Design to Resign
conference, December 2013


Modeling system calls for intrusion detection with dynamic window sizes
conference, January 2001


Enhancing IEC 62351 to Improve Security for Energy Automation in Smart Grid Environments
conference, May 2010


Anomaly detection using call stack information
conference, January 2003


Defending Synchrophasor Data Networks Against Traffic Analysis Attacks
journal, December 2011


Cyber–Physical Security of a Smart Grid Infrastructure
journal, January 2012


A Survey on Cyber Security for Smart Grid Communications
journal, January 2012


A network-based approach to counterfeit detection
conference, November 2013


Physical layer identification of embedded devices using RF-DNA fingerprinting
conference, October 2010


Cyber security in the Smart Grid: Survey and challenges
journal, April 2013


Survey in Smart Grid and Smart Home Security: Issues, Challenges and Countermeasures
journal, January 2014


Counterfeit mobile devices - the duck test
conference, October 2015


A Detailed Analysis of the Generic Object-Oriented Substation Event Message Structure in an IEC 61850 Standard-Based Substation Automation System
journal, August 2013


A fast automaton-based method for detecting anomalous program behaviors
conference, January 2001