{"id":28849,"date":"2015-01-27T14:44:43","date_gmt":"2015-01-27T19:44:43","guid":{"rendered":"http:\/\/www.opensource.im\/uncategorized\/rooting-out-malware-with-a-side-channel-chip-defense-system.php"},"modified":"2015-01-27T14:44:43","modified_gmt":"2015-01-27T19:44:43","slug":"rooting-out-malware-with-a-side-channel-chip-defense-system","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/cryptography\/rooting-out-malware-with-a-side-channel-chip-defense-system.php","title":{"rendered":"Rooting Out Malware With a Side-Channel Chip Defense System"},"content":{"rendered":"<p><p>    The world of malware has been turned on its head this week, as    a company in Virginia has introduceda new cybersecurity    technology that at first glance looks more like a classic    cyberattack.  <\/p>\n<p>    The idea hatched by PFP Cybersecurity of Vienna, Va., is taken    from the playbook of a famous cryptography-breaking scheme    called the side channel    attack. All malware, no matter the details of its code,    authorship, or execution, must consume power. And, as PFP has    found, the signature of malwares power usage looks very    different from the baseline power draw of a chips standard    operations.  <\/p>\n<p>    So this week, PFP is announcing a two-pronged technology    (called P2Scan and eMonitor) that physically sits outside the    CPU and sniffs the chips electromagnetic leakage for telltale    signatures of power consumption patterns indicating abnormal    behavior.  <\/p>\n<p>    The result, they say, is a practically undetectable,    all-purpose malware discovery protocol, especially for    low-level systems that follow a predictable and standard    routine. (Computers with users regularly attached to them, like    laptops and smartphones, often have no baseline routine from    which abnormal behavior can be inferred. So, PFP officials say,    their technology is at the moment better suited to things like    routers, networks, power grids, critical infrastructure, and    other more automated systems.)  <\/p>\n<p>    On average, malware exists on a system for 229 days before    anyone ever notices anything is there, Thurston Brooks, PFPs    vice president of engineering and product marketing told    IEEE Spectrum. Whats really cool about our system is    we tell you within milliseconds that something has happened.  <\/p>\n<p>    PFPan acronym for power fingerprintingrequires that its    users establish a firm baseline of normal operations for the    chips the company will be monitoring. So they begin with    P2Scan, a credit-card-size physical sensor that monitors a    given chip, board, device, embedded system, or network router    for its electromagnetic fingerprints when running normally.  <\/p>\n<p>    Unlike most malware strategies in the marketplace today, PFP    takes a strikingly software-agnostic tack to besting malware,    hardware Trojans, and other cyberattacks.  <\/p>\n<p>    Were not trying to actually understand whats going on inside    the machine, like the hackers are, says Brooks. Were trying    to define what normal behavior looks like. Then, knowing    [that], we can detect abnormal behavior.  <\/p>\n<p>    The view of malware as seen from outside the chip, in other    words, can be a refreshing one. Hackers cant detect this type    of surveillance, because the scanning tools never actually    interact with the chips operations. And hackers can be as    clever as the most sophisticated programmers in the world. Yet,    their code will still very likely be detected because, simply    by virtue of performing different tasks than the chip normally    performs, it will have a different power profile.  <\/p>\n<p>    I am a signal processing guy, says PFP president Jeff Reed,    who is also a professor in the ECE department at Virginia Tech.    Our approach is a very different approach than a person whos    normally schooled in securityWere trying to understand a    disturbance in the signal due to the inclusion of malware.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Read this article:<br \/>\n<a target=\"_blank\" href=\"http:\/\/spectrum.ieee.org\/riskfactor\/computing\/hardware\/rooting-out-malware-with-a-sidechannel-chip-defense-system\/RK=0\/RS=DhI9_nCLULd7Mt8m1QuZZ9xUHN4-\" title=\"Rooting Out Malware With a Side-Channel Chip Defense System\">Rooting Out Malware With a Side-Channel Chip Defense System<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> The world of malware has been turned on its head this week, as a company in Virginia has introduceda new cybersecurity technology that at first glance looks more like a classic cyberattack. <\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1600],"tags":[],"class_list":["post-28849","post","type-post","status-publish","format-standard","hentry","category-cryptography"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/28849"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=28849"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/28849\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=28849"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=28849"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=28849"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}