Detection of counterfeit and compromised devices using system and function call tracing techniques
Abstract
Frameworks, methods, and systems for securing a smart grid are provided. A framework can include data collection, call tracing techniques, and preparing call lists to detect counterfeit or compromised devices. The call tracing techniques can include call tracing and compiling all system and function calls over a time interval. The framework can further include data processing, in which a genuine device is identified and compared to unknown devices. A first statistical correlation can be used for resource-rich systems, and a second statistical correlation can be used for resource-limited systems. Threats of information leakage, measurement poisoning and store-and-send-later can be considered.
- Inventors:
- Issue Date:
- Research Org.:
- The Florida International University Board of Trustees, Miami, FL (United States)
- Sponsoring Org.:
- USDOE
- OSTI Identifier:
- 1463864
- Patent Number(s):
- 10027697
- Application Number:
- 15/581,453
- Assignee:
- The Florida International University Board of Trustees (Miami, FL)
- Patent Classifications (CPCs):
-
Y - NEW / CROSS SECTIONAL TECHNOLOGIES Y04 - INFORMATION OR COMMUNICATION TECHNOLOGIES HAVING AN IMPACT ON OTHER TECHNOLOGY AREAS Y04S - SYSTEMS INTEGRATING TECHNOLOGIES RELATED TO POWER NETWORK OPERATION, COMMUNICATION OR INFORMATION TECHNOLOGIES FOR IMPROVING THE ELECTRICAL POWER GENERATION, TRANSMISSION, DISTRIBUTION, MANAGEMENT OR USAGE, i.e. SMART GRIDS
H - ELECTRICITY H04 - ELECTRIC COMMUNICATION TECHNIQUE H04L - TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- DOE Contract Number:
- OE0000779
- Resource Type:
- Patent
- Resource Relation:
- Patent File Date: 2017 Apr 28
- Country of Publication:
- United States
- Language:
- English
Citation Formats
Babun, Leonardo, Aksu, Hidayet, and Uluagac, A. Selcuk. Detection of counterfeit and compromised devices using system and function call tracing techniques. United States: N. p., 2018.
Web.
Babun, Leonardo, Aksu, Hidayet, & Uluagac, A. Selcuk. Detection of counterfeit and compromised devices using system and function call tracing techniques. United States.
Babun, Leonardo, Aksu, Hidayet, and Uluagac, A. Selcuk. Tue .
"Detection of counterfeit and compromised devices using system and function call tracing techniques". United States. https://www.osti.gov/servlets/purl/1463864.
@article{osti_1463864,
title = {Detection of counterfeit and compromised devices using system and function call tracing techniques},
author = {Babun, Leonardo and Aksu, Hidayet and Uluagac, A. Selcuk},
abstractNote = {Frameworks, methods, and systems for securing a smart grid are provided. A framework can include data collection, call tracing techniques, and preparing call lists to detect counterfeit or compromised devices. The call tracing techniques can include call tracing and compiling all system and function calls over a time interval. The framework can further include data processing, in which a genuine device is identified and compared to unknown devices. A first statistical correlation can be used for resource-rich systems, and a second statistical correlation can be used for resource-limited systems. Threats of information leakage, measurement poisoning and store-and-send-later can be considered.},
doi = {},
journal = {},
number = ,
volume = ,
place = {United States},
year = {2018},
month = {7}
}
Works referenced in this record:
Systems and methods for data driven malware task identification
patent-application, December 2016
- Shakarian, Paulo; Nunes, Eric; Buto, Casey
- US Patent Application; 20160371490
Counterfeit Integrated Circuits: A Rising Threat in the Global Semiconductor Supply Chain
journal, August 2014
- Guin, Ujjwal; Huang, Ke; DiMase, Daniel
- Proceedings of the IEEE, Vol. 102, Issue 8, p. 1207-1228
Can EDA combat the rise of electronic counterfeiting?
conference, January 2012
- Koushanfar, Farinaz; Fazzari, Saverio; McCants, Carl
- DAC '12 Proceedings of the 49th Annual Design Automation Conference
Apparatus and method for monitoring secure software
patent, July 2011
- Chess, Brian; Do, Arthur; Fay, Sea
- US Patent Document 7,975,306
Framework for restricting resources consumed by ghost agents
patent-application, March 2005
- Creamer, Thomas E.; Hilf, Bill H.; Jaiswal, Peeyush
- US Patent Application 10/666310; 20050065994
Method And System For Authenticating Entities By Means Of Terminals
patent-application, January 2014
- Buntinx, Luc
- US Patent Application 14/009428; 20140026204
Methods And Systems For Encoding Computer Processes For Malware Detection
patent-application, June 2016
- Mainieri, Ronnie; Hastings, Curtis A.
- US Patent Application 14/960066; 20160164901
Detection of electronic counterfeit components
conference, May 2015
- Kanovsky, Andrej; Spanik, Pavol; Frivaldsky, Michal
- 2015 16th International Scientific Conference on Electric Power Engineering (EPE)
Hardware Security Through Chain Assurance
conference, January 2016
- Obeng, Yaw; Nolan, Colm; Brown, David
- Proceedings of the 2016 Design, Automation & Test in Europe Conference & Exhibition (DATE)
An NFC based consumer-level counterfeit detection framework
conference, July 2013
- Saeed, Muhammad Qasim; Bilal, Zeeshan; Walter, Colin D.
- 2013 Eleventh Annual Conference on Privacy, Security and Trust
Counterfeit electronics: A rising threat in the semiconductor manufacturing industry
conference, September 2013
- Huang, Ke; Carulli, John M.; Makris, Yiorgos
- 2013 IEEE International Test Conference (ITC)
NORT: Runtime Anomaly-Based Monitoring of Malicious Behavior for Windows
conference, January 2012
- Milea, Narcisa Andreea; Khoo, Siau Cheng; Lo, David
- International Conference on Runtime Verification, p. 115-130
Securing smart grid: cyber attacks, countermeasures, and challenges
journal, August 2012
- Li, Xu; Liang, Xiaohui; Lu, Rongxing
- IEEE Communications Magazine, Vol. 50, Issue 8, p. 38-45
Cybersecurity Standards: Managing Risk and Creating Resilience
journal, September 2014
- Collier, Zachary A.; DiMase, Daniel; Walters, Steve
- Computer, Vol. 47, Issue 9, p. 70-76
Collection of Measurements of Affective Response for Generation of Crowd-Based Results
patent-application, October 2016
- Frank, Ari M.; Thieberger, Gil
- US Patent Application 15/184401; 20160300252
Anti-counterfeit Techniques: From Design to Resign
conference, December 2013
- Guin, Ujjwal; Forte, Domenic; Tehranipoor, Mohammad
- 2013 14th International Workshop on Microprocessor Test and Verification
Modeling system calls for intrusion detection with dynamic window sizes
conference, January 2001
- Eskin, E.; Lee, Wenke; Stolfo, S. J.
- Proceedings DARPA Information Survivability Conference and Exposition II. DISCEX'01
Enhancing IEC 62351 to Improve Security for Energy Automation in Smart Grid Environments
conference, May 2010
- Fries, Steffen; Hof, Hans Joachim; Seewald, Maik
- 2010 Fifth International Conference on Internet and Web Applications and Services
Anomaly detection using call stack information
conference, January 2003
- Feng, H. H.; Kolesnikov, O. M.; Fogla, P.
- Security and Privacy, 2003. Proceedings. 2003 Symposium on
Defending Synchrophasor Data Networks Against Traffic Analysis Attacks
journal, December 2011
- Sikdar, Biplab; Chow, Joe H.
- IEEE Transactions on Smart Grid, Vol. 2, Issue 4
Virtual machine with dynamic data flow analysis
patent-application, October 2007
- Aziz, Ashar; Radhakrishnan, Ramesh; Ismael, Osman
- US Patent Application 11/471072; 20070250930
Cyber–Physical Security of a Smart Grid Infrastructure
journal, January 2012
- Yilin Mo, ; Kim, Tiffany Hyun-Jin; Brancik, K.
- Proceedings of the IEEE, Vol. 100, Issue 1
A Survey on Cyber Security for Smart Grid Communications
journal, January 2012
- Yan, Ye; Qian, Yi; Sharif, Hamid
- IEEE Communications Surveys & Tutorials, Vol. 14, Issue 4
Telephone Call Processing Method and Apparatus
patent-application, January 2014
- Brittain, Paul
- US Patent Application 14/039969; 20140023067
A network-based approach to counterfeit detection
conference, November 2013
- Sathyanarayana, Supreeth; Robinson, William H.; Beyah, Raheem A.
- 2013 IEEE International Conference on Technologies for Homeland Security (HST)
Physical layer identification of embedded devices using RF-DNA fingerprinting
conference, October 2010
- Cobb, William E.; Garcia, Eric W.; Temple, Michael A.
Cyber security in the Smart Grid: Survey and challenges
journal, April 2013
- Wang, Wenye; Lu, Zhuo
- Computer Networks, Vol. 57, Issue 5
Survey in Smart Grid and Smart Home Security: Issues, Challenges and Countermeasures
journal, January 2014
- Komninos, Nikos; Philippou, Eleni; Pitsillides, Andreas
- IEEE Communications Surveys & Tutorials, Vol. 16, Issue 4
Behavioral Model Based On Short And Long Range Event Correlations In System Traces
patent-application, August 2016
- Pieczul, Olgierd S.
- US Patent Application 15/045292; 20160239596
Counterfeit mobile devices - the duck test
conference, October 2015
- O’brien, John; Lehtonen, Kimmo
- 2015 10th International Conference on Malicious and Unwanted Software (MALWARE)
Who's in Control of Your Control System? Device Fingerprinting for Cyber-Physical Systems
conference, January 2016
- Formby, David; Srinivasan, Preethi; Leonard, Andrew
A Detailed Analysis of the Generic Object-Oriented Substation Event Message Structure in an IEC 61850 Standard-Based Substation Automation System
journal, August 2013
- Kriger, Carl; Behardien, Shaheen; Retonda-Modiya, John-Charly
- International Journal of Computers Communications & Control, Vol. 8, Issue 5
A fast automaton-based method for detecting anomalous program behaviors
conference, January 2001
- Sekar, R.; Bendre, M.; Dhurjati, D.
- Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001