This article focuses on the research and development work at the Eclipse Research Cluster at the University of Maryland, Baltimore County (UMBC) to address cybersecurity challenges. The research team is seeking to address cybersecurity challenges by employing a diverse set of specialty areas including Computer Science, Computer Engineering, and Electrical Engineering. This group is looking at leveraging physical relationships to provide a diversity of measurement and reporting to not only improve anomaly detection, but also make decisions about how to keep critical functions operating even if only in a degraded mode. By exploiting the physical relationships between pressing a brake pedal and the operator’s leg position and the power consumption of a sensor and the instructions being run in it, this group proposes to provide new indicators that can be used to increase resilience to cyberattacks. This concept describes an example for a small section of a typical vehicle system. This group’s future research is seeking to expand this general approach of using the physical relationships of sensors to the properties they are measuring or actuators and the cause or effect of their action.

References

1.
Cárdenas
,
Alvaro A.
,
Saurabh
Amin
, and
Shankar
Sastry.
“Research challenges for the security of control systems.” Proceedings of the 3rd conference on Hot topics in security. USENIX Association,
2008
.
2.
NIST Industrial Control System (ICS) Cyber Security presentation “Maroochy Water Services Case Study” , Aug. 2008, http://csrc.nist.gov/groups/SMA/fisma/ics/documents/Maroochy-Water-Services-Case-Study_briefing.pdf
3.
U. S. Senate Armed Services Committee Report:112-167, “Inquiry into Counterfeit Electronic Parts in the Department of Defense Supply Chain”, 2012, http://www.armed-services.senate.gov/imo/media/doc/Counterfeit-Electronic-Parts.pdf
4.
Bernstein
,
Kerry.
DARPA Broad Agency Announcement DARPA-BAA-14-16 “Supply Chain Hardware Integrity for Electronics Defense (SHIELD).”
2014
.
5.
Koushanfar
,
Farinaz
, and
Ramesh
Karri.
“Can the SHIELD protect our integrated circuits?.” In 2014 IEEE 57th International Midwest Symposium on Circuits and Systems (MWSCAS), pp.
350
353
. IEEE,
2014
.
6.
Hussain
,
Siam U.
,
Sudha
Yellapantula
,
Mehrdad
Majzoobi
, and
Farinaz
Koushanfar.
“BIST-PUF: Online, hardware-based evaluation of physically unclonable circuit identifiers.” In 2014 IEEE/ACM International Conference on Computer-Aided Design (ICCAD), pp.
162
169
. IEEE,
2014
.
7.
Kocher
,
Paul
,
Joshua
Jaffe
, and
Benjamin
Jun.
“Differential power analysis.” Annual International Cryptology Conference
.
Springer
Berlin Heidelberg
,
1999
8.
Kocher
,
Paul
, et al. “Introduction to differential power analysis.” Journal of Cryptographic Engineering 1.1, 2011: pp. 5-27. http://link.springer.com/content/pdf/10.1007/s13389-011-0006-y.pdf
9.
Quisquater
,
J.-J.
, and
Samyde
,
D.
,
“Electromagnetic analysis (ema): Measures and countermeasures for smart cards. In Smart Card Programming and Security,”
I.
Attali
and
T.
Jensen
, Eds., vol. 2140 of Lecture Notes in Computer Science.
Springer
Berlin Heidelberg
,
2001
, C pp.
200
210
10.
Biham
,
E.
, and
Shamir
,
A.
“Differential fault analysis of secret key cryptosystems.” In Advances in Cryptology - CRYPTO’97
,
J.
Kaliski
,
Burton
,
S.
, Ed., vol. 1294 of Lecture Notes in Computer Science.
Springer
Berlin Heidelberg
,
1997
, pp.
513
525
.
11.
Yang
,
B.
,
Wu
,
K.
, and
Karri
,
R.
“Scan based side channel attack on dedicated hardware implementations of Data Encryption Standard.” In Proceedings of the IEEE International Test Conference (ITC), Oct.
2004
, pp.
339
344
.
12.
Page
,
D.
“Theoretical use of cache memory as a cryptanalytic side-channel.” Technical report CSTR-02-003, Department of Computer Science, University of Bristol,
2002
.
13.
Kuhn
,
M.
“Cipher instruction search attack on the bus-encryption security microcontroller ds5002fp.” Computers, IEEE Transactions on 47, 10, Oct
1998
pp.
1153
1157
.
14.
Asonov
,
D.
, and
Agrawal
,
R.
“Keyboard acoustic emanations.” In 2004 IEEE Symposium on Security and Privacy (S&P 2004), 9-12 May 2004, Berkeley, CA, USA,
2004
, pp.
3
11
.
15.
“MSP430x1xx Family User's Guide,” (rev. f) ed., Texas Instruments, http://www.ti.com/lit/ug/slau049f/slau049f.pdf,
2006
16.
O.
Girard
, “openmsp430,” http://opencores.org/project,openmsp430,
2016
(accessed March 1, 2016).
17.
N. S.
Altman.
“An introduction to kernel and nearest-neighbor nonparametric regression.”
The American Statistician
,
46
(
3
):
175
185
, August
1992
.
18.
D.
Krishnankutty
,
R.
Robucci
,
C.
Patel
and
N.
Banerjee
(in press). “FISCAL : Firmware Identification using Side-Channel Power Analysis”, VLSI Test Symposium
2017
19.
Report by staff of U.S. Senator Edward Markey “Tracking & Hacking: Security & Privacy Gaps Put American Drivers at Risk”,
2014
, https://www.markey.senate.gov/imo/media/doc/2015-02-06_MarkeyReport-Tracking_Hacking_CarSecurity%202.pdf
20.
Kulandaivel
,
S.
,
Schmandt
,
J.
,
Fertig
M
,
Banerjee
,
N. Preseentation
“Detection and Mitigation of Anomalous Behavior in Embedded Automotive Networks”,
2016
, http://ur.umbc.edu/files/2016/06/kulandaivelSekarSm.pdf
21.
G.
Singh
,
T. A.
Chen
,
R.
Robucci
,
C.
Patel
and
N.
Banerjee
, “distratto: Impaired Driving Detection Using Textile Sensors,” in IEEE Sensors Journal, vol.
16
, no.
8
, April15,
2016
, pp.
2666
2673
.
You do not currently have access to this content.