Asset Details
MbrlCatalogueTitleDetail
Do you wish to reserve the book?
Profiling with trust: system monitoring from trusted execution environments
by
Hönig, Timo
, Röckl, Jonas
, Jung, Benedikt
, Eichler, Christian
, Schlenk, Ralph
, Müller, Tilo
in
Anomalies
/ Artificial intelligence
/ Business metrics
/ CAE) and Design
/ Circuits and Systems
/ Computer-Aided Engineering (CAD
/ Denial of service attacks
/ Detectors
/ Edge computing
/ Engineering
/ Internet of Things
/ Intrusion detection systems
/ Machine learning
/ Malware
/ Monitoring
/ Monitoring systems
/ Operating systems
/ Program errors
/ Programming languages
/ Rootkit
/ Software
/ Special Purpose and Application-Based Systems
2024
Hey, we have placed the reservation for you!
By the way, why not check out events that you can attend while you pick your title.
You are currently in the queue to collect this book. You will be notified once it is your turn to collect the book.
Oops! Something went wrong.
Looks like we were not able to place the reservation. Kindly try again later.
Are you sure you want to remove the book from the shelf?
Profiling with trust: system monitoring from trusted execution environments
by
Hönig, Timo
, Röckl, Jonas
, Jung, Benedikt
, Eichler, Christian
, Schlenk, Ralph
, Müller, Tilo
in
Anomalies
/ Artificial intelligence
/ Business metrics
/ CAE) and Design
/ Circuits and Systems
/ Computer-Aided Engineering (CAD
/ Denial of service attacks
/ Detectors
/ Edge computing
/ Engineering
/ Internet of Things
/ Intrusion detection systems
/ Machine learning
/ Malware
/ Monitoring
/ Monitoring systems
/ Operating systems
/ Program errors
/ Programming languages
/ Rootkit
/ Software
/ Special Purpose and Application-Based Systems
2024
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
Do you wish to request the book?
Profiling with trust: system monitoring from trusted execution environments
by
Hönig, Timo
, Röckl, Jonas
, Jung, Benedikt
, Eichler, Christian
, Schlenk, Ralph
, Müller, Tilo
in
Anomalies
/ Artificial intelligence
/ Business metrics
/ CAE) and Design
/ Circuits and Systems
/ Computer-Aided Engineering (CAD
/ Denial of service attacks
/ Detectors
/ Edge computing
/ Engineering
/ Internet of Things
/ Intrusion detection systems
/ Machine learning
/ Malware
/ Monitoring
/ Monitoring systems
/ Operating systems
/ Program errors
/ Programming languages
/ Rootkit
/ Software
/ Special Purpose and Application-Based Systems
2024
Please be aware that the book you have requested cannot be checked out. If you would like to checkout this book, you can reserve another copy
We have requested the book for you!
Your request is successful and it will be processed during the Library working hours. Please check the status of your request in My Requests.
Oops! Something went wrong.
Looks like we were not able to place your request. Kindly try again later.
Profiling with trust: system monitoring from trusted execution environments
Journal Article
Profiling with trust: system monitoring from trusted execution environments
2024
Request Book From Autostore
and Choose the Collection Method
Overview
Large-scale attacks on IoT and edge computing devices pose a significant threat. As a prominent example, Mirai is an IoT botnet with 600,000 infected devices around the globe, capable of conducting effective and targeted DDoS attacks on (critical) infrastructure. Driven by the substantial impacts of attacks, manufacturers and system integrators propose Trusted Execution Environments (TEEs) that have gained significant importance recently. TEEs offer an execution environment to run small portions of code isolated from the rest of the system, even if the operating system is compromised. In this publication, we examine TEEs in the context of system monitoring and introduce the Trusted Monitor (TM), a novel anomaly detection system that runs within a TEE. The TM continuously profiles the system using hardware performance counters and utilizes an application-specific machine-learning model for anomaly detection. In our evaluation, we demonstrate that the TM accurately classifies 86% of 183 tested workloads, with an overhead of less than 2%. Notably, we show that a real-world kernel-level rootkit has observable effects on performance counters, allowing the TM to detect it. Major parts of the TM are implemented in the Rust programming language, eliminating common security-critical programming errors.
Publisher
Springer US,Springer,Springer Nature B.V
Subject
This website uses cookies to ensure you get the best experience on our website.