{"id":89969,"date":"2019-04-25T16:42:20","date_gmt":"2019-04-25T23:42:20","guid":{"rendered":"https:\/\/lifeboat.com\/blog\/2019\/04\/new-technique-uses-power-anomalies-to-id-malware-in-embedded-systems"},"modified":"2019-04-25T16:42:20","modified_gmt":"2019-04-25T23:42:20","slug":"new-technique-uses-power-anomalies-to-id-malware-in-embedded-systems","status":"publish","type":"post","link":"https:\/\/lifeboat.com\/blog\/2019\/04\/new-technique-uses-power-anomalies-to-id-malware-in-embedded-systems","title":{"rendered":"New technique uses power anomalies to ID malware in embedded systems"},"content":{"rendered":"<p><a class=\"aligncenter blog-photo\" href=\"https:\/\/lifeboat.com\/blog.images\/new-technique-uses-power-anomalies-to-id-malware-in-embedded-systems2.jpg\"><\/a><\/p>\n<p>Researchers from North Carolina State University and the University of Texas at Austin have developed a technique for detecting types of malware that use a system\u2019s architecture to thwart traditional security measures. The new detection approach works by tracking power fluctuations in embedded systems.<\/p>\n<p>\u201cEmbedded systems are basically any computer that doesn\u2019t have a physical keyboard \u2013 from smartphones to Internet of Things devices,\u201d says Aydin Aysu, co-author of a paper on the work and an assistant professor of electrical and computer engineering at NC State. \u201cEmbedded systems are used in everything from the voice-activated virtual assistants in our homes to industrial control systems like those used in <a href=\"https:\/\/techxplore.com\/tags\/power+plants\/\" rel=\"tag\" class=\"\">power plants<\/a>. And <a href=\"https:\/\/techxplore.com\/tags\/malware\/\" rel=\"tag\" class=\"\">malware<\/a> that targets those systems can be used to seize control of these systems or to steal information.\u201d<\/p>\n<p>At issue are so-called micro-architectural attacks. This form of malware makes use of a system\u2019s <a href=\"https:\/\/techxplore.com\/tags\/architectural+design\/\" rel=\"tag\" class=\"\">architectural design<\/a>, effectively hijacking the hardware in a way that gives outside users control of the system and access to its data. Spectre and Meltdown are high-profile examples of micro-architectural malware.<\/p>\n<p><a href=\"https:\/\/techxplore.com\/news\/2019-04-technique-power-anomalies-id-malware.html\" target=\"_blank\" rel=\"noopener noreferrer\"><\/p>\n<div style=\"clear:both;\">Read more<\/div>\n<p><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Researchers from North Carolina State University and the University of Texas at Austin have developed a technique for detecting types of malware that use a system\u2019s architecture to thwart traditional security measures. The new detection approach works by tracking power fluctuations in embedded systems. \u201cEmbedded systems are basically any computer that doesn\u2019t have a physical [\u2026]<\/p>\n","protected":false},"author":427,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[34,418,1512,6],"tags":[],"class_list":["post-89969","post","type-post","status-publish","format-standard","hentry","category-cybercrime-malcode","category-internet","category-mobile-phones","category-robotics-ai"],"_links":{"self":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/89969","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/users\/427"}],"replies":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/comments?post=89969"}],"version-history":[{"count":0,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/89969\/revisions"}],"wp:attachment":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/media?parent=89969"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/categories?post=89969"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/tags?post=89969"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}