Aye: A Trusted Forensic Method for Firmware Tampering Attacks

نویسندگان

چکیده

The Programmable Logic Controller (PLC) is located at the junction of virtual network and physical reality in Industrial Control System (ICS), which vulnerable to attacks due its weak security. Specifically, firmware tampering take under PLC operating system as primary attack target. provides bridge between PLC’s hardware software, means against can be more destructive harmful than other attacks. However, existing defense forensics methods are asymmetrical, directly leads proliferation such difficulty forensic tracing. How accurately, quickly, efficiently conduct for an urgent problem. In this paper, we designed implemented a reliable detection method based on Joint Test Action Group (JTAG) memory comparison—Aye, detect mainstream reliably. To determine effectiveness reliability Aye, selected widely used observe Aye’s performance by simulating two latest methods. experimental results show that Aye effectively defend attacks, helping improve efficiency accuracy forensics.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Trusted Firmware Services Based on TPM

How to build trusted firmware platform has been a research hot in computer security community. In this paper, a novel entrusted firmware services under UEFI framework are proposed, which exploits the high safety of Trusted Platform Module (TPM) root and uneditability of firmware for building the trusted platform in code modification checking, user identity authenticating, hard disk attestation ...

متن کامل

Learning under p-Tampering Attacks

Recently, Mahloujifar and Mahmoody (TCC’17) studied attacks against learning algorithms using a special case of Valiant’s malicious noise, called p-tampering, in which the adversary gets to change any training example with independent probability p but is limited to only choose ‘adversarial’ examples with correct labels. They obtained p-tampering attacks that increase the error probability in t...

متن کامل

Forensic Analysis of Digital Image Tampering

The use of digital photography has increased over the past few years, a trend which opens the door for new and creative ways to forge images. The manipulation of images through forgery influences the perception an observer has of the depicted scene, potentially resulting in ill consequences if created with malicious intentions. This poses a need to verify the authenticity of images originating ...

متن کامل

Computer-Aided Annotation for Video Tampering Dataset of Forensic Research

The annotation of video tampering dataset is a boring task that takes a lot of manpower and financial resources. At present, there is no published literature which is capable to improve the annotation efficiency of forged videos. We presented a computer-aided annotation method for video tampering dataset in this paper. This annotation method can be utilized to label the frames of forged video s...

متن کامل

Trusted Detection of Unauthorized Filesystem Modifications to Combat Insider Tampering †

An insider-robust approach to file integrity verification is developed using interacting strata of mobile agents. Previous approaches relied upon monolithic architectures, or more recently, agent frameworks using a centralized control mechanism or common reporting repository. However, any such distinct tamperingpoint introduces vulnerabilities, especially from knowledgeable insiders capable of ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Symmetry

سال: 2023

ISSN: ['0865-4824', '2226-1877']

DOI: https://doi.org/10.3390/sym15010145