TY - GEN
T1 - InTrust-IoT
T2 - Workshop on Hardware and Architectural Support for Security and Privacy, HASP 2021
AU - Mohammed, Hawzhin
AU - Khalid, Faiq
AU - Sawyer, Paul
AU - Cataloni, Gabriella
AU - Hasan, Syed Rafay
N1 - Publisher Copyright:
© 2021 ACM.
PY - 2021/10/18
Y1 - 2021/10/18
N2 - Modern Resource-Constrained (RC) Internet of Things (IoT) devices are subject to several types of attacks, including hardware-level attacks. Most of the existing state-of-the-art solutions are invasive, require expensive design time interventions, or need dataset generation from non-trusted RC-IoT devices or both. We argue that the health of modern RC-IoT devices requires a final line of defense against possible hardware attacks that go undetected during the IC design and test process. Hence, in this paper, we propose a defense methodology against non-zero-day and zero-day attacks, leveraging machine learning techniques trained on the dataset obtained without design time intervention and using 'only' trusted IoT devices. In the process, a complete eco-system is developed where data is generated through a trusted group of devices, and machine learning is done on these trusted datasets. Next, this trusted trained model is deployed in regular IoT systems that contain untrusted devices, where the attack on untrusted devices can be detected in real-time. Our results indicate that for non-zero-day attacks, the proposed technique can concurrently detect DoS and power depletion attacks with an accuracy of about 80%. Similarly, zero-day attack experiments are able to detect the attack without fail as well.
AB - Modern Resource-Constrained (RC) Internet of Things (IoT) devices are subject to several types of attacks, including hardware-level attacks. Most of the existing state-of-the-art solutions are invasive, require expensive design time interventions, or need dataset generation from non-trusted RC-IoT devices or both. We argue that the health of modern RC-IoT devices requires a final line of defense against possible hardware attacks that go undetected during the IC design and test process. Hence, in this paper, we propose a defense methodology against non-zero-day and zero-day attacks, leveraging machine learning techniques trained on the dataset obtained without design time intervention and using 'only' trusted IoT devices. In the process, a complete eco-system is developed where data is generated through a trusted group of devices, and machine learning is done on these trusted datasets. Next, this trusted trained model is deployed in regular IoT systems that contain untrusted devices, where the attack on untrusted devices can be detected in real-time. Our results indicate that for non-zero-day attacks, the proposed technique can concurrently detect DoS and power depletion attacks with an accuracy of about 80%. Similarly, zero-day attack experiments are able to detect the attack without fail as well.
UR - http://www.scopus.com/inward/record.url?scp=85132249506&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85132249506&partnerID=8YFLogxK
U2 - 10.1145/3505253.3505262
DO - 10.1145/3505253.3505262
M3 - Conference contribution
AN - SCOPUS:85132249506
T3 - ACM International Conference Proceeding Series
BT - HASP 2021 - Workshop on Hardware and Architectural Support for Security and Privacy
PB - Association for Computing Machinery
Y2 - 18 October 2021
ER -