A Self-Organising Map Based Algorithm for Analysis of ICmetrics Features

ICmetrics is a new approach that exploits the characteristic and behaviour of an embedded system to obtain a collection of properties and features, which aims to uniquely identify and secure an embedded system based on its own behavioural identity. In this paper, an algorithm based on a self-organising map (SOM) neural network is proposed to extract and analyse the features derived from a processor's performance profile (i.e. average cycles per instruction (CPI)), where the extracted features are used to help finding the main behaviours of the system. The proposed algorithm has been tested with different programs selected from the MiBench benchmark suite, and the results achieved show that it can successfully segment each program into different main phases based on the unique extracted features, which confirms its utility for the ICmetrics technology.

[1]  Teuvo Kohonen,et al.  The self-organizing map , 1990, Neurocomputing.

[2]  Trevor Mudge,et al.  MiBench: A free, commercially representative embedded benchmark suite , 2001 .

[3]  Brad Calder,et al.  Discovering and Exploiting Program Phases , 2003, IEEE Micro.

[4]  Ryan N. Rakvic,et al.  The Fuzzy Correlation between Code and Performance Predictability , 2004, 37th International Symposium on Microarchitecture (MICRO-37'04).

[5]  Srivaths Ravi,et al.  Secure embedded processing through hardware-assisted run-time monitoring , 2005, Design, Automation and Test in Europe.

[6]  W. Gareth J. Howells,et al.  Normalizing Discrete Circuit Features with Statistically Independent values for incorporation within a highly Secure Encryption System , 2007, Second NASA/ESA Conference on Adaptive Hardware and Systems (AHS 2007).

[7]  G. Edward Suh,et al.  Physical Unclonable Functions for Device Authentication and Secret Key Generation , 2007, 2007 44th ACM/IEEE Design Automation Conference.

[8]  A. Uhl,et al.  An iris-based Interval-Mapping scheme for Biometric Key generation , 2009, 2009 Proceedings of 6th International Symposium on Image and Signal Processing and Analysis.

[9]  Helena Handschuh,et al.  Hardware Intrinsic Security from Physically Unclonable Functions , 2010, Towards Hardware-Intrinsic Security.

[10]  Jeffrey M. Voas,et al.  BYOD: Security and Privacy Considerations , 2012, IT Professional.

[11]  Dongbing Gu,et al.  ICmetrics for Low Resource Embedded Systems , 2012, 2012 Third International Conference on Emerging Security Technologies.

[12]  Hessam Kooti,et al.  Hardware-Assisted Detection of Malicious Software in Embedded Systems , 2012, IEEE Embedded Systems Letters.

[13]  Dongbing Gu,et al.  A practical proposal for ensuring the provenance of hardware devices and their safe operation , 2012 .