WP2: Security aware low power IoT Processor

Slides:



Advertisements
Similar presentations
Why Have The OSGi Specifications Been Based On Java Technology ? By Peter Kriens, CEO aQute OSGi Technology Officer
Advertisements

Secure Virtual Machine Execution Under an Untrusted Management OS Chunxiao Li Anand Raghunathan Niraj K. Jha.
Vulnerabilities in Embedded Harvard Architecture Processors Presented By: Michael J. Hohnka Cyber Vulnerabilities Lead Cyber Innovation Division Communications,
Mining Behavior Models Wenke Lee College of Computing Georgia Institute of Technology.
1 3 rd SG13 Regional Workshop for Africa on “ITU-T Standardization Challenges for Developing Countries Working for a Connected Africa” (Livingstone, Zambia,
A Virtual Environment for Investigating Counter Measures for MITM Attacks on Home Area Networks Lionel Morgan 1, Sindhuri Juturu 2, Justin Talavera 3,
Dr. José M. Reyes Álamo 1.  Course website  Syllabus posted.
Secure Embedded Processing through Hardware-assisted Run-time Monitoring Zubin Kumar.
HyperSpector: Virtual Distributed Monitoring Environments for Secure Intrusion Detection Kenichi Kourai Shigeru Chiba Tokyo Institute of Technology.
MASY: Management of Secret keYs in Mobile Federated Wireless Sensor Networks Jef Maerien IBBT DistriNet Research Group Department of Computer Science Katholieke.
Ether: Malware Analysis via Hardware Virtualization Extensions Author: Artem Dinaburg, Paul Royal, Monirul Sharif, Wenke Lee Presenter: Yi Yang Presenter:
Overview Abstract Vulnerability: An Overview Cloud Computing Cloud-Specific Vulnerabilities Architectural Components and Vulnerabilities Conclusion.
Dynamic Resource Monitoring and Allocation in a virtualized environment.
Vigilante: End-to-End Containment of Internet Worms Authors : M. Costa, J. Crowcroft, M. Castro, A. Rowstron, L. Zhou, L. Zhang, and P. Barham In Proceedings.
Kyushu University Koji Inoue ICECS'061 Supporting A Dynamic Program Signature: An Intrusion Detection Framework for Microprocessors Koji Inoue Department.
SAM-21 Fortress Model and Defense in Depth Some revision on Computer Architecture.
Virtual Workspaces Kate Keahey Argonne National Laboratory.
R ECONFIGURABLE SECURITY SUPPORT FOR EMBEDDED SYSTEMS 1 AKSHATA VARDHARAJ.
Internet of Things (IoT) or Internet of Everythings (IoE) A very brief introduction Internet of Things/Revised from Anders Bøjesson1.
Ensemble Learning for Low-level Hardware-supported Malware Detection
Security Vulnerabilities in A Virtual Environment
Wireless and Mobile Security
Azam Supervisor : Prof. Raj Jain
Author: Tatsuya Yamazaki National institute of Information and Communications Technology Presenter: Samanvoy Panati.
Protecting The Kernel Data through Virtualization Technology BY VENKATA SAI PUNDAMALLI id :
Panel: Engineering Discipline in Cyber Security Steve Orrin, Chief Technologist, Intel Federal, Intel Coporation.
Dr. Anant R Koppar Jan 29, General Trends  Energy Consumption increases  More people (Born, Longer life-time)  More equipment  Higher Living.
Exploiting Instruction Streams To Prevent Intrusion Milena Milenkovic.
ADAPTIVE CACHE-LINE SIZE MANAGEMENT ON 3D INTEGRATED MICROPROCESSORS Takatsugu Ono, Koji Inoue and Kazuaki Murakami Kyushu University, Japan ISOCC 2009.
SpyProxy SpyProxy Execution-based Detection of MaliciousWeb Content Execution-based Detection of MaliciousWeb Content Hongjin, Lee.
Third International Workshop on Networked Appliance 2001 SONA: Applying Mobile Agent to Networked Appliance Control S.Aoki, S.Makino, T.Okoshi J.Nakazawa.
NADAV PELEG HEAD OF MOBILE SECURITY The Mobile Threat: Consumer Devices Business Risks David Parkinson MOBILE SECURITY SPECIALIST, NER.
BORDER SECURITY USING WIRELESS INTEGRATED NETWORK SENSORS (WINS) By B.S.Indrani (07841A0406) Aurora’s Technological and Research Institute.
By SPEC INFOTECH. A programming language reigning the IT industry Marking its presence around the globe Striking Features which make Java supreme: Simplistic.
CloudMAC: Moving MAC frames processing of the Sink to Cloud.
Secure Offloading of Legacy IDSes Using Remote VM Introspection in Semi-trusted IaaS Clouds Kenichi Kourai Kazuki Juda Kyushu Institute of Technology.
Constraint Framework, page 1 Collaborative learning for security and repair in application communities MIT site visit April 10, 2007 Constraints approach.
Security and resilience for Smart Hospitals Key findings
About Me Name: Yaokai Feng, from Kyushu University
TASHKENT UNIVERSITY OF INFORMATION TECHNOLOGIES NAMED AFTER MUHAMMAD AL-KHWARIZMI THE SMART HOME IS A BASIC OF SMART CITIES: SECURITY AND METHODS OF.
Institute for Cyber Security
Towards an optimized BlockChain for IoT
Grid Computing.
Pulse: An Adaptive Intrusion Detection System for the Internet of Things (IoT) Good morning every one , I will give you a brief overview of the work my.
BotCatch: A Behavior and Signature Correlated Bot Detection Approach
National Mining University
Dissecting the Cyber Security Threat Landscape
Hardware Support for Embedded Operating System Security
The security and vulnerabilities of IoT devices
Network Security: IP Spoofing and Firewall
Internet of Things (IoT)
Internet of Things Vulnerabilities
Visualizing IOT Data for Smarter Decision Support Systems
Layer-wise Performance Bottleneck Analysis of Deep Neural Networks
Home Internet Vulnerabilities
Controlling Sensors Efficiently with MCUs
Airmic Conference 2018 // Workshop B4
Securing the Internet of Things: Key Insights and Best Practices Across the Industry Theresa Bui Revon IoT Cloud Strategy.
Elecbits.
IoT Security – fel vagyunk rá készülve?
Cybersecurity ATD Scenario conclusion
Embedded system Micro controller.
Session 26 INST 346 Technologies, Infrastructure and Architecture
An approach to the Internet of Things system containing nomadic units development Nataliia Gvozdetska Andrii Zakharchuk Volodymyr Prokopets Zvonarov Oleh.
Kenichi Kourai Kyushu Institute of Technology
Weaponizing IoT Ted Harrington Executive Partner
Houston Code Wars Bob Moore March 2, 2019 WWAS 2019 | Confidential.
Japan Smart Home Market. According to Renub Research market research report titled “Japan Pet Food Market, Population by Animal Type, Products, Distribution.
IoT in Healthcare: Life or Death
Presentation transcript:

WP2: Security aware low power IoT Processor The 4th International Workshop on Cyber Security – Securing IoT Lightning talks Takatsugu Ono Kyushu University

Background and Motivation The key features of IoT system Many distributed devices Connected to the internet Low performance The devices can’t execute a rich attacking program One device is not a threat But, MANY devices can be a threat I think the key features of IoT are many distributed embedded devices, and the devices are connected. The performance of the device is low because a designer focus on reducing power and cost. So, the IoT devices can't execute a rich attacking program. It means one device is no threat, but attacker use many devices, it could be a threat.

Example: Smart Building IoT systems Air conditioner Internet Refrigerator Other systems TV etc. Let's think about smart building application There are some IoT systems in a house, and they are connected to the internet.

Example: Smart Building IoT systems Air conditioner Malware Internet Refrigerator Other systems TV Target etc. Here, the attacker tries to attack such as DDoS to the target. [C] Then, the attacker injects a malware into the IoT system, and highjack them. [C] The attacker performs the DDoS attack by using the highjacked devices. To make matters worse, there are many homes. So the attacker realizes strong DDoS attack exploiting the IoT systems. Attacker

Approach Threat detector Runtime energy-efficient monitoring Machine-learning based run-time program authentication Power attack detection, etc Runtime energy-efficient monitoring Low-cost, flexible monitoring Efficient power/energy management Virtual machine (VM) for IoT devices Low performance overhead, energy-efficient VM CPU/Memory architecture Architectural support for the VM and monitoring system To solv this problem, we will develop a threat detector, which can detect not authorized program such as malware.

Approach Threat detector Runtime energy-efficient monitoring Machine-learning based run-time program authentication Power attack detection, etc Runtime energy-efficient monitoring Low-cost, flexible monitoring Efficient power/energy management Virtual machine (VM) for IoT devices Low performance overhead, energy-efficient VM CPU/Memory architecture Architectural support for the VM and monitoring system The detector has features of authorized programs and is comparing the features during program execution. In this research, we will exploit machine learning based approach.

Approach Threat detector Runtime energy-efficient monitoring Machine-learning based run-time program authentication Power attack detection, etc Runtime energy-efficient monitoring Low-cost, flexible monitoring Efficient power/energy management Virtual machine (VM) for IoT devices Low performance overhead, energy-efficient VM CPU/Memory architecture Architectural support for the VM and monitoring system We need features of the program, so we monitor the behavior of the program. This mechanism should be low cost and energy efficient.

Approach Threat detector Runtime energy-efficient monitoring Machine-learning based run-time program authentication Power attack detection, etc Runtime energy-efficient monitoring Low-cost, flexible monitoring Efficient power/energy management Virtual machine (VM) for IoT devices Low performance overhead, energy-efficient VM CPU/Memory architecture Architectural support for the VM and monitoring system We believe that a VM for IoT devices can extract the behavior. The requirements are low performance overhead, and energy-efficient.

Approach Threat detector Runtime energy-efficient monitoring Machine-learning based run-time program authentication Power attack detection, etc Runtime energy-efficient monitoring Low-cost, flexible monitoring Efficient power/energy management Virtual machine (VM) for IoT devices Low performance overhead, energy-efficient VM CPU/Memory architecture Architectural support for the VM and monitoring system Also, CPU and Memory architecture should support the low overhead monitoring system. This system allows executing authorized programs.

Conclusions There will be many IoT devices One device is low performance, but attackers exploit the many devices We develop a threat detector Allow to execute only authorized program Collaboration Run-time energy-efficient monitoring IITD: Power, thermal monitoring KU: Program behavior CPU/Memory architecture IITD: Architectural support for light-weight VM KU: Architectural support for security and power/energy efficiency IoT devices are increasing. One device is low performance, but attackers exploit the many devices. So, we develop a threat detector, which allow to execute only authorized program. IITD and Kyushu University collaborate to develop the threat detector. At run-time energy-efficient monitoring area, IITD develops power and thermal monitoring system and Kyushu University analyzes the program behavior. And, at CPU/Memory architecture area, IITD supports light-weight VM and Kyushu University develops architectural supports for security and power/energy efficiency.

Thank you