Kofi Appiah, X. Zhai, Shoaib Ehsan, Wah M. Cheung, Huosheng Hu, Dongbing Gu, K. Mcdonald-Maier, G. Howells
{"title":"程序计数器作为安全程序识别的集成电路度量","authors":"Kofi Appiah, X. Zhai, Shoaib Ehsan, Wah M. Cheung, Huosheng Hu, Dongbing Gu, K. Mcdonald-Maier, G. Howells","doi":"10.1109/EST.2013.23","DOIUrl":null,"url":null,"abstract":"Integrated Circuit Metrics is mainly concerned with the extraction of measurable properties or features of a given hardware device, capable of uniquely identifying the system's behaviour. This paper presents features that can be extracted from software executing on a device and identify the very software in execution. The main contribution of this paper is in two folds. The ability to extract features whiles the software is in execution as well as correctly identifying the software to divulge any tampering or malicious exploitation. Our aim is to use program counter values generated during program execution to train a k-means algorithm optimized for vector quantization, and later use the system to associate program counter values with an application.","PeriodicalId":213735,"journal":{"name":"2013 Fourth International Conference on Emerging Security Technologies","volume":"61 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":"{\"title\":\"Program Counter as an Integrated Circuit Metrics for Secured Program Identification\",\"authors\":\"Kofi Appiah, X. Zhai, Shoaib Ehsan, Wah M. Cheung, Huosheng Hu, Dongbing Gu, K. Mcdonald-Maier, G. Howells\",\"doi\":\"10.1109/EST.2013.23\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Integrated Circuit Metrics is mainly concerned with the extraction of measurable properties or features of a given hardware device, capable of uniquely identifying the system's behaviour. This paper presents features that can be extracted from software executing on a device and identify the very software in execution. The main contribution of this paper is in two folds. The ability to extract features whiles the software is in execution as well as correctly identifying the software to divulge any tampering or malicious exploitation. Our aim is to use program counter values generated during program execution to train a k-means algorithm optimized for vector quantization, and later use the system to associate program counter values with an application.\",\"PeriodicalId\":213735,\"journal\":{\"name\":\"2013 Fourth International Conference on Emerging Security Technologies\",\"volume\":\"61 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2013-09-09\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"5\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2013 Fourth International Conference on Emerging Security Technologies\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/EST.2013.23\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 Fourth International Conference on Emerging Security Technologies","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/EST.2013.23","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Program Counter as an Integrated Circuit Metrics for Secured Program Identification
Integrated Circuit Metrics is mainly concerned with the extraction of measurable properties or features of a given hardware device, capable of uniquely identifying the system's behaviour. This paper presents features that can be extracted from software executing on a device and identify the very software in execution. The main contribution of this paper is in two folds. The ability to extract features whiles the software is in execution as well as correctly identifying the software to divulge any tampering or malicious exploitation. Our aim is to use program counter values generated during program execution to train a k-means algorithm optimized for vector quantization, and later use the system to associate program counter values with an application.