Share Email Print

Proceedings Paper

Block-level algorithm classification based on RF side-channel
Author(s): James T. Graham; Ronald Riley; Rusty Baldwin; Ashwin Fisher
Format Member Price Non-Member Price
PDF $17.00 $21.00

Paper Abstract

Internet of Things (IoT) and other similar devices often have little to no security and thus can be readily exploited in any number of ways. In this work, we collect radio frequency (RF) emissions from simple processors on several IoT devices and apply machine learning techniques to detect modifications (corrupted or injected via malware) in ‘known’ software running on the processor. We can detect these modifications due to the correlation between RF emissions and the digital state of the devices. Every bit flip produces a small but potentially detectable electrical pulse. Our approach to developing the recognition algorithm is to adapt to the variability created by the input data by recognizing the sequences in which instruction blocks are executed. Seemingly minor changes to input values can have a detectable effect on the measured RF side channel. We collect RF data from a variety of IoT devices with clock speeds varying from 16-96 MHz. A 1-GHz Riscure RF near-field antenna probe was placed within a millimeter of the IoT device, RF emissions were acquired, and software controls triggered data collection. A classification architecture was trained using object code portioned into blocks to develop the truth data. We then applied new data to the trained block classifier. This approach detects deviations in individual blocks and block sequences as a whole, allowing a greater level of detection resolution than just binary ‘Yes/No’ classification. Initial testing results showed greater than 90% classification accuracy for block-level modifications, and we can detect deviations from truth data with 100% accuracy.

Paper Details

Date Published: 3 May 2018
PDF: 7 pages
Proc. SPIE 10630, Cyber Sensing 2018, 1063008 (3 May 2018); doi: 10.1117/12.2303847
Show Author Affiliations
James T. Graham, Riverside Research (United States)
Ronald Riley, Riverside Research (United States)
Rusty Baldwin, Univ. of Dayton (United States)
Ashwin Fisher, Riverside Research (United States)

Published in SPIE Proceedings Vol. 10630:
Cyber Sensing 2018
Igor V. Ternovskiy; Peter Chin, Editor(s)

© SPIE. Terms of Use
Back to Top
Sign in to read the full article
Create a free SPIE account to get access to
premium articles and original research
Forgot your username?