Supporting a dynamic program signature

An intrusion detection framework for microprocessors

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

To address computer security issues, a hardware-based intrusion detection technique is proposed. This uses the dynamic program execution behavior for authentication. Based on secret key information, an execution behavior is determined. Next, a secure compiler constructs object code which generates the predetermined execution behavior at runtime. During program execution, a secure profiler monitors the execution behavior. If the profiler cannot detect the expected behavior, it sends an alarm signal to the microprocessor for terminating program execution. Since attack code cannot anticipate the execution behavior required, malicious attacks can be detected and prohibited at the start of program execution.

Original languageEnglish
Title of host publicationICECS 2006 - 13th IEEE International Conference on Electronics, Circuits and Systems
Pages160-163
Number of pages4
DOIs
Publication statusPublished - Dec 1 2006
EventICECS 2006 - 13th IEEE International Conference on Electronics, Circuits and Systems - Nice, France
Duration: Dec 10 2006Dec 13 2006

Publication series

NameProceedings of the IEEE International Conference on Electronics, Circuits, and Systems

Other

OtherICECS 2006 - 13th IEEE International Conference on Electronics, Circuits and Systems
CountryFrance
CityNice
Period12/10/0612/13/06

Fingerprint

Intrusion detection
Security of data
Authentication
Microprocessor chips
Hardware

All Science Journal Classification (ASJC) codes

  • Engineering(all)

Cite this

Koji, I. (2006). Supporting a dynamic program signature: An intrusion detection framework for microprocessors. In ICECS 2006 - 13th IEEE International Conference on Electronics, Circuits and Systems (pp. 160-163). [4263328] (Proceedings of the IEEE International Conference on Electronics, Circuits, and Systems). https://doi.org/10.1109/ICECS.2006.379744

Supporting a dynamic program signature : An intrusion detection framework for microprocessors. / Koji, Inoue.

ICECS 2006 - 13th IEEE International Conference on Electronics, Circuits and Systems. 2006. p. 160-163 4263328 (Proceedings of the IEEE International Conference on Electronics, Circuits, and Systems).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Koji, I 2006, Supporting a dynamic program signature: An intrusion detection framework for microprocessors. in ICECS 2006 - 13th IEEE International Conference on Electronics, Circuits and Systems., 4263328, Proceedings of the IEEE International Conference on Electronics, Circuits, and Systems, pp. 160-163, ICECS 2006 - 13th IEEE International Conference on Electronics, Circuits and Systems, Nice, France, 12/10/06. https://doi.org/10.1109/ICECS.2006.379744
Koji I. Supporting a dynamic program signature: An intrusion detection framework for microprocessors. In ICECS 2006 - 13th IEEE International Conference on Electronics, Circuits and Systems. 2006. p. 160-163. 4263328. (Proceedings of the IEEE International Conference on Electronics, Circuits, and Systems). https://doi.org/10.1109/ICECS.2006.379744
Koji, Inoue. / Supporting a dynamic program signature : An intrusion detection framework for microprocessors. ICECS 2006 - 13th IEEE International Conference on Electronics, Circuits and Systems. 2006. pp. 160-163 (Proceedings of the IEEE International Conference on Electronics, Circuits, and Systems).
@inproceedings{fdfe9a1880014e298e9501b3d5f1e377,
title = "Supporting a dynamic program signature: An intrusion detection framework for microprocessors",
abstract = "To address computer security issues, a hardware-based intrusion detection technique is proposed. This uses the dynamic program execution behavior for authentication. Based on secret key information, an execution behavior is determined. Next, a secure compiler constructs object code which generates the predetermined execution behavior at runtime. During program execution, a secure profiler monitors the execution behavior. If the profiler cannot detect the expected behavior, it sends an alarm signal to the microprocessor for terminating program execution. Since attack code cannot anticipate the execution behavior required, malicious attacks can be detected and prohibited at the start of program execution.",
author = "Inoue Koji",
year = "2006",
month = "12",
day = "1",
doi = "10.1109/ICECS.2006.379744",
language = "English",
isbn = "1424403952",
series = "Proceedings of the IEEE International Conference on Electronics, Circuits, and Systems",
pages = "160--163",
booktitle = "ICECS 2006 - 13th IEEE International Conference on Electronics, Circuits and Systems",

}

TY - GEN

T1 - Supporting a dynamic program signature

T2 - An intrusion detection framework for microprocessors

AU - Koji, Inoue

PY - 2006/12/1

Y1 - 2006/12/1

N2 - To address computer security issues, a hardware-based intrusion detection technique is proposed. This uses the dynamic program execution behavior for authentication. Based on secret key information, an execution behavior is determined. Next, a secure compiler constructs object code which generates the predetermined execution behavior at runtime. During program execution, a secure profiler monitors the execution behavior. If the profiler cannot detect the expected behavior, it sends an alarm signal to the microprocessor for terminating program execution. Since attack code cannot anticipate the execution behavior required, malicious attacks can be detected and prohibited at the start of program execution.

AB - To address computer security issues, a hardware-based intrusion detection technique is proposed. This uses the dynamic program execution behavior for authentication. Based on secret key information, an execution behavior is determined. Next, a secure compiler constructs object code which generates the predetermined execution behavior at runtime. During program execution, a secure profiler monitors the execution behavior. If the profiler cannot detect the expected behavior, it sends an alarm signal to the microprocessor for terminating program execution. Since attack code cannot anticipate the execution behavior required, malicious attacks can be detected and prohibited at the start of program execution.

UR - http://www.scopus.com/inward/record.url?scp=47349099674&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=47349099674&partnerID=8YFLogxK

U2 - 10.1109/ICECS.2006.379744

DO - 10.1109/ICECS.2006.379744

M3 - Conference contribution

SN - 1424403952

SN - 9781424403950

T3 - Proceedings of the IEEE International Conference on Electronics, Circuits, and Systems

SP - 160

EP - 163

BT - ICECS 2006 - 13th IEEE International Conference on Electronics, Circuits and Systems

ER -