Share Email Print
cover

Proceedings Paper

Lightweight hardware monitoring of IoT devices
Author(s): Andrew Toth; Dan Rapczynski; Jason A. Wampler
Format Member Price Non-Member Price
PDF $14.40 $18.00
cover GOOD NEWS! Your organization subscribes to the SPIE Digital Library. You may be able to download this paper for free. Check Access

Paper Abstract

IoT devices are systematically vulnerable to vendor introduced bugs, network as well as supply chain attacks. Further, unprotected and unmonitored physical access is common while single board computer based IoT devices have limited or no ability to detect and mitigate most types of attacks. Various methods have been described that use software based analysis, execution monitoring, and other cryptographic functions but these methods are not practical for small devices and often require modifications or additions to a simple sensor board that uses more power and is itself vulnerable to software bugs. Also, additional software space for non-mission code is difficult or not possible to add. This paper describes a novel light weight method to detect a compromise or abnormal behavior through the monitoring of readable and writable hardware elements on the device. An example prototype is described using an Arduino class device, common for many commercial sensing applications.

Paper Details

Date Published: 3 May 2018
PDF: 8 pages
Proc. SPIE 10630, Cyber Sensing 2018, 106300H (3 May 2018); doi: 10.1117/12.2305254
Show Author Affiliations
Andrew Toth, U.S. Army Research Lab. (United States)
Dan Rapczynski, INCA Engineering (United States)
Jason A. Wampler, INCA Engineering (United States)


Published in SPIE Proceedings Vol. 10630:
Cyber Sensing 2018
Igor V. Ternovskiy; Peter Chin, Editor(s)

© SPIE. Terms of Use
Back to Top