SG10201509052WA - Using power fingerprinting (pfp) to monitor the integrity and enhance security of computer based systems - Google Patents

Using power fingerprinting (pfp) to monitor the integrity and enhance security of computer based systems

Info

Publication number
SG10201509052WA
SG10201509052WA SG10201509052WA SG10201509052WA SG10201509052WA SG 10201509052W A SG10201509052W A SG 10201509052WA SG 10201509052W A SG10201509052W A SG 10201509052WA SG 10201509052W A SG10201509052W A SG 10201509052WA SG 10201509052W A SG10201509052W A SG 10201509052WA
Authority
SG
Singapore
Prior art keywords
pfp
integrity
monitor
based systems
computer based
Prior art date
Application number
SG10201509052WA
Inventor
Jeffrey H Reed
Gonzalez Carlos R Aguayo
Original Assignee
Virginia Tech Intell Prop
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority to US40967010P priority Critical
Priority to US201161475713P priority
Application filed by Virginia Tech Intell Prop filed Critical Virginia Tech Intell Prop
Publication of SG10201509052WA publication Critical patent/SG10201509052WA/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F1/00Details not covered by groups G06F3/00 – G06F13/00 and G06F21/00
    • G06F1/26Power supply means, e.g. regulation thereof
    • G06F1/28Supervision thereof, e.g. detecting power-supply failure by out of limits supervision
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F1/00Details not covered by groups G06F3/00 – G06F13/00 and G06F21/00
    • G06F1/26Power supply means, e.g. regulation thereof
    • G06F1/32Means for saving power
    • G06F1/3203Power management, i.e. event-based initiation of power-saving mode
    • G06F1/3206Monitoring of events, devices or parameters that trigger a change in power modality
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/3058Monitoring arrangements for monitoring environmental properties or parameters of the computing system or of the computing system component, e.g. monitoring of power, currents, temperature, humidity, position, vibrations
    • G06F11/3062Monitoring arrangements for monitoring environmental properties or parameters of the computing system or of the computing system component, e.g. monitoring of power, currents, temperature, humidity, position, vibrations where the monitored property is the power consumption
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/3089Monitoring arrangements determined by the means or processing involved in sensing the monitored data, e.g. interfaces, connectors, sensors, probes, agents
    • G06F11/3093Configuration details thereof, e.g. installation, enabling, spatial arrangement of the probes
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/52Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/75Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information by inhibiting the analysis of circuitry or operation
    • G06F21/755Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information by inhibiting the analysis of circuitry or operation with measures against power attack
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/03Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
    • G06F2221/033Test or assess software
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/03Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
    • G06F2221/034Test or assess a computer or a system
SG10201509052WA 2010-11-03 2011-11-03 Using power fingerprinting (pfp) to monitor the integrity and enhance security of computer based systems SG10201509052WA (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
US40967010P true 2010-11-03 2010-11-03
US201161475713P true 2011-04-15 2011-04-15

Publications (1)

Publication Number Publication Date
SG10201509052WA true SG10201509052WA (en) 2015-12-30

Family

ID=46025123

Family Applications (2)

Application Number Title Priority Date Filing Date
SG10201509052WA SG10201509052WA (en) 2010-11-03 2011-11-03 Using power fingerprinting (pfp) to monitor the integrity and enhance security of computer based systems
SG2013033477A SG190090A1 (en) 2010-11-03 2011-11-03 Using power fingerprinting (pfp) to monitor the integrity and enhance security of computer based systems

Family Applications After (1)

Application Number Title Priority Date Filing Date
SG2013033477A SG190090A1 (en) 2010-11-03 2011-11-03 Using power fingerprinting (pfp) to monitor the integrity and enhance security of computer based systems

Country Status (15)

Country Link
US (4) US9262632B2 (en)
EP (1) EP2635992B1 (en)
JP (1) JP2014501957A (en)
KR (1) KR20130118335A (en)
CN (1) CN103370716B (en)
AU (1) AU2011323210A1 (en)
BR (1) BR112013011038A2 (en)
CA (1) CA2816970A1 (en)
ES (1) ES2628820T3 (en)
IL (1) IL226078D0 (en)
MX (1) MX2013005074A (en)
PL (1) PL2635992T4 (en)
RU (1) RU2013125468A (en)
SG (2) SG10201509052WA (en)
WO (1) WO2012061663A2 (en)

Families Citing this family (47)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE102012024818A1 (en) * 2012-03-06 2013-09-12 Conti Temic Microelectronic Gmbh Procedures to improve functional safety and increase the availability of an electronic control system, as well as an electronic control system
US8874926B1 (en) * 2012-03-08 2014-10-28 Sandia Corporation Increasing security in inter-chip communication
CN102663285B (en) * 2012-03-21 2015-06-10 北京奇虎科技有限公司 Extracting method and extracting device for APK (android package) virus characteristic code
US9349011B2 (en) * 2012-05-16 2016-05-24 Fisher-Rosemount Systems, Inc. Methods and apparatus to identify a degradation of integrity of a process control system
WO2013184099A1 (en) 2012-06-05 2013-12-12 Empire Technology Development, Llc Cross-user correlation for detecting server-side multi-target intrusion
CN102694820B (en) * 2012-06-13 2015-01-21 华为技术有限公司 Processing method of signature rule, server and intrusion defending system
US20120317421A1 (en) * 2012-06-19 2012-12-13 Concurix Corporation Fingerprinting Executable Code
US10445530B1 (en) * 2012-07-23 2019-10-15 National Technology & Engineering Solutions Of Sandia, Llc Hardware intrusion detection system
US9014370B2 (en) * 2012-12-09 2015-04-21 Sandisk Technologies Inc. High performance hardware-based execution unit for performing C2 block cipher encryption/decryption
JP2016517597A (en) * 2013-03-15 2016-06-16 パワー フィンガープリンティング インコーポレイテッド System, method and apparatus for enhancing integrity assessment using a power fingerprinting system in a computer-based system
DE102013214398A1 (en) 2013-07-23 2015-01-29 Siemens Aktiengesellschaft Monitoring of redundant components
US9280355B2 (en) * 2013-08-29 2016-03-08 International Business Machines Corporation System with manual actuator for asserting physical presence across multiple compute nodes
KR101480904B1 (en) * 2013-09-25 2015-01-13 한국전자통신연구원 Apparatus and method for selecting waveform for side-channel analysis
US9239918B2 (en) * 2013-10-02 2016-01-19 Andes Technology Corporation Method and apparatus for software-hardware authentication of electronic apparatus
US9934119B2 (en) * 2013-10-22 2018-04-03 Cisco Technology, Inc. Rogue hardware detection through power monitoring
WO2015089346A1 (en) 2013-12-13 2015-06-18 Battelle Memorial Institute Electronic component classification
US9684787B2 (en) * 2014-04-08 2017-06-20 Qualcomm Incorporated Method and system for inferring application states by performing behavioral analysis operations in a mobile device
JP6421436B2 (en) * 2014-04-11 2018-11-14 富士ゼロックス株式会社 Unauthorized communication detection device and program
DE102014207810A1 (en) * 2014-04-25 2015-10-29 Bayerische Motoren Werke Aktiengesellschaft Method and device for operating a motor vehicle
US10296740B2 (en) 2014-05-18 2019-05-21 B.G. Negev Technologies and Application Ltd., at Ben-Gurion University System and method for detecting activities within a bootstrap of a computerized device based on monitoring of power consumption
US9774614B2 (en) * 2014-06-24 2017-09-26 Qualcomm Incorporated Methods and systems for side channel analysis detection and protection
US9509707B2 (en) * 2014-06-24 2016-11-29 Qualcomm Incorporated Methods and systems for thwarting side channel attacks
CN107169190A (en) * 2015-01-13 2017-09-15 成都锐开云科技有限公司 A kind of parasitic parameter extraction method
AU2016248313A1 (en) * 2015-04-16 2017-11-09 Temporal Defense Systems, Llc Methods and systems for self-detection of post-production external hardware attachments
US9954870B2 (en) * 2015-04-29 2018-04-24 International Business Machines Corporation System conversion in a networked computing environment
US9923908B2 (en) 2015-04-29 2018-03-20 International Business Machines Corporation Data protection in a networked computing environment
US9462013B1 (en) 2015-04-29 2016-10-04 International Business Machines Corporation Managing security breaches in a networked computing environment
US9268938B1 (en) * 2015-05-22 2016-02-23 Power Fingerprinting Inc. Systems, methods, and apparatuses for intrusion detection and analytics using power characteristics such as side-channel information collection
US9904785B2 (en) * 2015-06-02 2018-02-27 Rockwell Automation Technologies, Inc. Active response security system for industrial control infrastructure
US9558053B1 (en) * 2015-06-26 2017-01-31 Amazon Technologies, Inc. Computer systems monitoring using beat frequency analysis
US10289819B2 (en) * 2015-08-12 2019-05-14 Kryptowire LLC Active authentication of users
US20170067961A1 (en) * 2015-09-04 2017-03-09 NewAE Technology Inc. Method and Apparatus for Detection of Counterfeit, Defective or Damaged Devices
US20170154182A1 (en) * 2015-11-30 2017-06-01 International Business Machines Corporation System, method and apparatus for usable code-level statistical analysis with applications in malware detection
CN108292247A (en) * 2015-12-02 2018-07-17 动力指纹股份有限公司 Method and apparatus for the supply chain for using channel information verification electronic equipment in side in signature analysis
US10078364B2 (en) * 2016-01-14 2018-09-18 Hcl Technologies Limited System and method for optimizing power consumption of one or more devices
EP3436790A4 (en) 2016-03-30 2019-11-06 3D Signals Ltd Acoustic monitoring of machinery
WO2017210005A1 (en) * 2016-05-31 2017-12-07 University Of South Florida Systems and methods for detecting attacks in big data systems
US10097572B1 (en) 2016-06-07 2018-10-09 EMC IP Holding Company LLC Security for network computing environment based on power consumption of network devices
US20180013779A1 (en) * 2016-07-06 2018-01-11 Power Fingerprinting Inc. Methods and apparatuses for integrity validation of remote devices using side-channel information in a power signature analysis
US20180011130A1 (en) * 2016-07-06 2018-01-11 Power Fingerprinting Inc. Methods and apparatuses for characteristic management with side-channel signature analysis
KR20190019208A (en) * 2016-07-15 2019-02-26 더 리젠츠 오브 더 유니버시티 오브 미시건 How to Identify Damaged Electronic Control Units with Voltage Fingerfering
US10467402B2 (en) * 2016-08-23 2019-11-05 Lenovo (Singapore) Pte. Ltd. Systems and methods for authentication based on electrical characteristic information
US10419931B1 (en) 2016-08-25 2019-09-17 EMC IP Holding Company LLC Security for network computing environment using centralized security system
DE102017214057A1 (en) 2017-08-11 2019-02-14 Siemens Aktiengesellschaft Method for checking the integrity of system components of a system and arrangement for carrying out the method
IL254573D0 (en) * 2017-09-18 2017-11-30 Cyber Sepio Systems Ltd System method and computer program product for securing a local area network from threats introduced by rogue or malicious devices
KR102036707B1 (en) * 2017-10-31 2019-10-25 국방과학연구소 Method for analyzing mission impact factor based on dependency of assets to tasks
US20190156037A1 (en) * 2017-11-17 2019-05-23 AVAST Software s.r.o. Using a machine learning model in quantized steps for malware detection

Family Cites Families (28)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5339445A (en) * 1992-11-16 1994-08-16 Harris Corporation Method of autonomously reducing power consumption in a computer sytem by compiling a history of power consumption
WO1996018934A1 (en) * 1994-12-14 1996-06-20 Green Logic Inc. A further improved system logic controller for digital computers
FI20011947A (en) * 2001-10-05 2003-04-06 Nokia Corp A method for controlling the operation of the processor and the processor
US7093147B2 (en) * 2003-04-25 2006-08-15 Hewlett-Packard Development Company, L.P. Dynamically selecting processor cores for overall power efficiency
US7877621B2 (en) 2004-09-03 2011-01-25 Virginia Tech Intellectual Properties, Inc. Detecting software attacks by monitoring electric power consumption patterns
US7515094B2 (en) 2004-10-18 2009-04-07 Nokomis, Inc. Advanced electromagnetic location of electronic equipment
US7613935B2 (en) 2005-07-29 2009-11-03 Hewlett-Packard Development Company, L.P. Power monitoring for processor module
EP1835425B1 (en) * 2006-03-17 2009-04-08 Fraunhofer-Gesellschaft zur Förderung der angewandten Forschung e.V. Watermarking apparatus, software enabling an implementation of an electronic circuit comprising a watermark, method for detecting a watermark and apparatus for detecting a watermark
US20080091975A1 (en) 2006-10-17 2008-04-17 Konstantin Kladko Method and system for side-channel testing a computing device and for improving resistance of a computing device to side-channel attacks
US7983860B2 (en) * 2006-11-10 2011-07-19 Ocz Technology Group, Inc. Method and system for monitoring power consumption of a computer component
US7464005B1 (en) 2007-06-29 2008-12-09 The Curators Of The University Of Missouri Electromagnetic emissions stimulation and detection system
US8245295B2 (en) 2007-07-10 2012-08-14 Samsung Electronics Co., Ltd. Apparatus and method for detection of malicious program using program behavior
US8713680B2 (en) 2007-07-10 2014-04-29 Samsung Electronics Co., Ltd. Method and apparatus for modeling computer program behaviour for behavioural detection of malicious program
US8069490B2 (en) 2007-10-16 2011-11-29 Oracle America, Inc. Detecting counterfeit electronic components using EMI telemetric fingerprints
CN201170900Y (en) 2007-12-19 2008-12-24 田一鸣 Intelligent monitoring apparatus for electric power system safety operation
US8457913B2 (en) 2008-06-04 2013-06-04 Oracle America, Inc. Computer system with integrated electromagnetic-interference detectors
US7869977B2 (en) 2008-08-08 2011-01-11 Oracle America, Inc. Using multiple antennas to characterize a computer system based on electromagnetic signals
WO2010044069A1 (en) 2008-10-16 2010-04-22 Koninklijke Philips Electronics N.V. Method, device and system for identifying electronic products
US8643539B2 (en) 2008-11-19 2014-02-04 Nokomis, Inc. Advance manufacturing monitoring and diagnostic tool
US8255341B2 (en) 2008-12-19 2012-08-28 Oracle America, Inc. Analyzing a target electromagnetic signal radiating from a computer system
US8242793B2 (en) 2009-03-17 2012-08-14 International Business Machines Corporation Electromagnetic profiling to validate electronic device authenticity
WO2010141826A2 (en) 2009-06-05 2010-12-09 The Regents Of The University Of Michigan System and method for detecting energy consumption anomalies and mobile malware variants
US8330493B2 (en) 2009-10-14 2012-12-11 Chaologix, Inc. High utilization universal logic array with variable circuit topology and logistic map circuit to realize a variety of logic gates with constant power signatures
US8537050B2 (en) 2009-10-23 2013-09-17 Nokomis, Inc. Identification and analysis of source emissions through harmonic phase comparison
JP5354611B2 (en) 2010-07-29 2013-11-27 独立行政法人産業技術総合研究所 Authenticity judgment method for electronic circuit components
US8825823B2 (en) 2011-01-06 2014-09-02 Nokomis, Inc System and method for physically detecting, identifying, diagnosing and geolocating electronic devices connectable to a network
US9059189B2 (en) 2011-03-02 2015-06-16 Nokomis, Inc Integrated circuit with electromagnetic energy anomaly detection and processing
US10475754B2 (en) 2011-03-02 2019-11-12 Nokomis, Inc. System and method for physically detecting counterfeit electronics

Also Published As

Publication number Publication date
US9558350B2 (en) 2017-01-31
US20170310482A1 (en) 2017-10-26
PL2635992T4 (en) 2017-09-29
US20160117502A1 (en) 2016-04-28
IL226078D0 (en) 2013-06-27
CN103370716A (en) 2013-10-23
EP2635992A4 (en) 2015-08-05
JP2014501957A (en) 2014-01-23
CN103370716B (en) 2016-10-19
KR20130118335A (en) 2013-10-29
PL2635992T3 (en) 2017-08-31
EP2635992B1 (en) 2017-02-22
AU2011323210A1 (en) 2013-05-23
ES2628820T3 (en) 2017-08-04
RU2013125468A (en) 2014-12-10
WO2012061663A2 (en) 2012-05-10
US20160117503A1 (en) 2016-04-28
SG190090A1 (en) 2013-06-28
WO2012061663A3 (en) 2012-07-19
EP2635992A2 (en) 2013-09-11
US9262632B2 (en) 2016-02-16
BR112013011038A2 (en) 2016-08-23
US10423207B2 (en) 2019-09-24
MX2013005074A (en) 2013-08-29
US9558349B2 (en) 2017-01-31
US20130318607A1 (en) 2013-11-28
CA2816970A1 (en) 2012-05-10

Similar Documents

Publication Publication Date Title
DK2446062T3 (en) Methods and systems for phylogenetic analysis
GB2533006B (en) Systems and methods to detect copy number variation
GB2517329B (en) Method and device to acquire seismic data
HK1224396A1 (en) Systems and methods for private cloud computing
PL2592224T3 (en) Methods and systems for drilling
EP2406717A4 (en) Systems and methods for the detection of malware
BR112013013167A2 (en) bromodomain inhibitors and their uses
EP2600957A4 (en) Bio-oil recovery systems and methods
EP2650798A4 (en) Searchable encryption processing system
HK1196522A1 (en) Systems and methods to gather and analyze electroencephalographic data
BR112012017253A2 (en) method, computer program, or set of computer and device programs
EP2659329A4 (en) Power management via coordination and selective operation of timer-related tasks
EP2543060A4 (en) Systems and methods for application of optical materials to optical elements
EP2526522A4 (en) Extraction and publication of reusable organizational knowledge
EP2547888A4 (en) Processing fuel and water
GB201102311D0 (en) Methods and apparatus related to management of experiments
SG10201401763SA (en) Diagnosis And Treatments Relating To TH2 Inhibition
EP2972877A4 (en) Systems, methods, and apparatus to enhance the integrity assessment when using power fingerprinting systems for computer-based systems
EP2569692A4 (en) One-time use password systems and methods
EP2815266A4 (en) Systems and methods for removably coupling an electronic device to eyewear
EP2548122A4 (en) Highly scalable and distributed data de-duplication
BRPI1013062A2 (en) systems and methods to protect cloud data
EP2659711A4 (en) Method of enhanced connection recovery and loss-less data recovery
HK1172740A1 (en) Connector and connection device for electronic equipment
EP2652696A4 (en) Systems and methods for facilitating secure transactions