Aye: A Trusted Forensic Method for Firmware Tampering Attacks
نویسندگان
چکیده
The Programmable Logic Controller (PLC) is located at the junction of virtual network and physical reality in Industrial Control System (ICS), which vulnerable to attacks due its weak security. Specifically, firmware tampering take under PLC operating system as primary attack target. provides bridge between PLC’s hardware software, means against can be more destructive harmful than other attacks. However, existing defense forensics methods are asymmetrical, directly leads proliferation such difficulty forensic tracing. How accurately, quickly, efficiently conduct for an urgent problem. In this paper, we designed implemented a reliable detection method based on Joint Test Action Group (JTAG) memory comparison—Aye, detect mainstream reliably. To determine effectiveness reliability Aye, selected widely used observe Aye’s performance by simulating two latest methods. experimental results show that Aye effectively defend attacks, helping improve efficiency accuracy forensics.
منابع مشابه
Trusted Firmware Services Based on TPM
How to build trusted firmware platform has been a research hot in computer security community. In this paper, a novel entrusted firmware services under UEFI framework are proposed, which exploits the high safety of Trusted Platform Module (TPM) root and uneditability of firmware for building the trusted platform in code modification checking, user identity authenticating, hard disk attestation ...
متن کاملLearning under p-Tampering Attacks
Recently, Mahloujifar and Mahmoody (TCC’17) studied attacks against learning algorithms using a special case of Valiant’s malicious noise, called p-tampering, in which the adversary gets to change any training example with independent probability p but is limited to only choose ‘adversarial’ examples with correct labels. They obtained p-tampering attacks that increase the error probability in t...
متن کاملForensic Analysis of Digital Image Tampering
The use of digital photography has increased over the past few years, a trend which opens the door for new and creative ways to forge images. The manipulation of images through forgery influences the perception an observer has of the depicted scene, potentially resulting in ill consequences if created with malicious intentions. This poses a need to verify the authenticity of images originating ...
متن کاملComputer-Aided Annotation for Video Tampering Dataset of Forensic Research
The annotation of video tampering dataset is a boring task that takes a lot of manpower and financial resources. At present, there is no published literature which is capable to improve the annotation efficiency of forged videos. We presented a computer-aided annotation method for video tampering dataset in this paper. This annotation method can be utilized to label the frames of forged video s...
متن کاملTrusted Detection of Unauthorized Filesystem Modifications to Combat Insider Tampering †
An insider-robust approach to file integrity verification is developed using interacting strata of mobile agents. Previous approaches relied upon monolithic architectures, or more recently, agent frameworks using a centralized control mechanism or common reporting repository. However, any such distinct tamperingpoint introduces vulnerabilities, especially from knowledgeable insiders capable of ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Symmetry
سال: 2023
ISSN: ['0865-4824', '2226-1877']
DOI: https://doi.org/10.3390/sym15010145