Unlock instant, AI-driven research and patent intelligence for your innovation.

Method and system for determining hidden backdoor in embedded system through side channel signals

An embedded system and signal determination technology, applied in the field of computer security, can solve problems such as complexity, low efficiency, and high cost, and achieve the effects of improving efficiency, protecting security and privacy, and reducing costs

Active Publication Date: 2018-03-13
AEROSPACE INFORMATION
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] The existing embedded system backdoor detection technology basically needs to analyze the source code to draw conclusions, but this method is more complicated, costly and inefficient

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for determining hidden backdoor in embedded system through side channel signals
  • Method and system for determining hidden backdoor in embedded system through side channel signals
  • Method and system for determining hidden backdoor in embedded system through side channel signals

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0045] Exemplary embodiments of the present invention will now be described with reference to the drawings; however, the present invention may be embodied in many different forms and are not limited to the embodiments described herein, which are provided for the purpose of exhaustively and completely disclosing the present invention. invention and fully convey the scope of the invention to those skilled in the art. The terms used in the exemplary embodiments shown in the drawings do not limit the present invention. In the figures, the same units / elements are given the same reference numerals.

[0046] Unless otherwise specified, the terms (including scientific and technical terms) used herein have the commonly understood meanings to those skilled in the art. In addition, it can be understood that terms defined by commonly used dictionaries should be understood to have consistent meanings in the context of their related fields, and should not be understood as idealized or over...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a method and a system for determining a hidden backdoor in an embedded system through side channel signals. The method comprises the steps of collecting multiple side channel signals of multiple invalid commands in an executive process; aligning the collected side channel signals in time to obtain multiple time sequence side channel signals; performing mean value calculationon the obtained time sequence side channel signals to obtain a reference time sequence side channel signal; calculating a variance value of the obtained reference time sequence side channel signal and determining a threshold according to the variance value; comparing the time sequence side channel signals with the reference time sequence side channel signal, and calculating difference values; comparing absolute values of the difference values with the threshold to determine to-be-processed invalid commands; and performing waveform comparison on the time sequence side channel signals of the to-be-processed invalid commands and the reference time sequence side channel signal to determine whether the to-be-processed invalid commands are hidden backdoors disguised as the invalid commands or not.

Description

technical field [0001] The present invention relates to the field of computer security, and more particularly, to a method and system for determining hidden backdoors in embedded systems through side channels. Background technique [0002] The existing embedded application development system is generally composed of three parts: a hardware platform, a Chinese operating system (COS, China Operating System) and an application program. Among them, the hardware platform is the hardware basis for realizing various functions. The COS system is mainly responsible for command scheduling, resource management, internal and external data transmission, etc., while the application part executes business logic. These three parts are generally realized by different manufacturers. [0003] For embedded application developers, the development platforms they purchase generally include hardware platforms and COS systems. Therefore, only the application logic needs to be developed, which can...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/55G06F21/57
CPCG06F21/556G06F21/57
Inventor 华刚
Owner AEROSPACE INFORMATION