Systems, methods, and apparatus to enhance the integrity assessment when using power fingerprinting systems for computer-based systems
First Claim
1. An apparatus, comprising:
- a power fingerprint monitor configured to receive a signal representing an unauthorized access of a device, the signal associated with bit transitions of an execution of a sequence of instructions by the device; and
a processor operatively coupled to the power fingerprint monitor, the processor configured to select a response from a plurality of responses in response to a detection of the unauthorized access based on the signal, the plurality of responses including at least one of a first response, a second response, and a third response; and
the processor configured to collect information associated with the device during the unauthorized access in response to the first response being selected,the processor configured to prevent access to the device in response to the unauthorized access in response to the second response being selected,the processor configured to disable at least a portion of the device subjected to the unauthorized access in response to the third response being selected.
1 Assignment
0 Petitions
Accused Products
Abstract
A power fingerprinting system is adopted for assessing integrity of a target computer-based system. In one implementation, the power fingerprinting system may receive, at a first module, side-channel information of a first target component of a system, the first module being collocated with the first target component; obtain a power fingerprint for the first target component based on the side-channel information for the first target component, the power fingerprint for the first target component representing a plurality of execution statuses of the first target component; receive, at a second module, side-channel information of a second target component of the system, the second module being collocated with the second target component, the power fingerprint for the second target component representing a plurality of execution statuses of the second target component; and obtain a power fingerprint for the second target component based on the side-channel information for the second target component.
54 Citations
20 Claims
-
1. An apparatus, comprising:
-
a power fingerprint monitor configured to receive a signal representing an unauthorized access of a device, the signal associated with bit transitions of an execution of a sequence of instructions by the device; and a processor operatively coupled to the power fingerprint monitor, the processor configured to select a response from a plurality of responses in response to a detection of the unauthorized access based on the signal, the plurality of responses including at least one of a first response, a second response, and a third response; and the processor configured to collect information associated with the device during the unauthorized access in response to the first response being selected, the processor configured to prevent access to the device in response to the unauthorized access in response to the second response being selected, the processor configured to disable at least a portion of the device subjected to the unauthorized access in response to the third response being selected. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A method, comprising:
-
receiving, from a sensor, power signature information of a target device, the power signature information associated with bit transitions of an execution of a sequence of instructions during an anomaly behavior of the target device; determining, based on the power signature information and in response to the anomaly behavior, a response from a plurality of responses that includes collecting information associated with the target device during the anomaly behavior; and sending, after the determining, a signal to execute the response. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A non-transitory processor-readable medium storing code representing instructions to be executed by a processor, the code comprising code to cause the processor to:
-
receive, from a sensor, power signature information of a target device during an unauthorized access to the target device; determine, based on the power signature information and in response to a detection of the unauthorized access, a response from a plurality of responses that includes collecting information associated with the target device during the unauthorized access; and send a signal to execute the response. - View Dependent Claims (20)
-
Specification