"New Technique Uses Power Anomalies to ID Malware in Embedded Systems"

Using a new technique developed by researchers from North Carolina State University and the University of Texas at Austin, malware can be detected in embedded systems. Embedded systems in voice-activated virtual assistants, industrial control systems such as those used in power plants, and more, can be targeted by a type of malware that abuses a system's architectural design, called micro-architectural malware, for the purpose of hijacking these systems or stealing sensitive data. This article continues to discuss micro-architectural attacks against embedded systems and the power-monitoring technique developed by researchers to detect such attacks. 

NC State News report "New Technique Uses Power Anomalies to ID Malware in Embedded Systems"

 

Submitted by Anonymous on