skip to main content
10.1145/3508398.3519366acmconferencesArticle/Chapter ViewAbstractPublication PagescodaspyConference Proceedingsconference-collections
poster

Transforming Memory Image to Sound Wave Signals for an Effective IoT Fingerprinting

Published:15 April 2022Publication History

ABSTRACT

As the need and adaptation for smart environments continue to rise, owing mainly to the evolution in IoT technology's processing and sensing capabilities, the security community must contend with increasing attack surfaces on our network, critical systems, and infrastructures. Thus, developing an effective fingerprint to deal with some of these threats is of paramount importance. As such, in this paper, we explored the use of memory snapshots for effective dynamic process-level fingerprints. Our technique transforms a memory snapshot into a sound wave signal, from which we then retrieve their distinctive Mel-Frequency Cepstral Coefficients (MFCC) features as unique process-level identifiers. The evaluation of this proposed technique on our dataset demonstrated that MFCC-based fingerprints generated from the same IoT process memory at different times exhibit much stronger similarities than those acquired from different IoT process spaces.

Skip Supplemental Material Section

Supplemental Material

CODASPY-codasp10-Presentation.mp4

mp4

16.6 MB

References

  1. Long Cheng, Ke Tian, Daphne Yao, Lui Sha, and Raheem A Beyah. 2019. Checking is believing: Event-aware program anomaly detection in cyber-physical systems. IEEE Transactions on Dependable and Secure Computing (2019).Google ScholarGoogle Scholar
  2. V Rama Krishna and R Subhashini. 2020. Mimicking attack by botnet and detection at gateway. Peer-to-Peer Networking and Applications (2020), 1--11.Google ScholarGoogle Scholar
  3. Poonam Yadav, Angelo Feraudo, Budi Arief, Siamak F Shahandashti, and Vassilios G Vassilakis. 2020. Position paper: A systematic framework for categorising IoT device fingerprinting mechanisms. In Proceedings of the 2nd International Workshop on Challenges in Artificial Intelligence and Machine Learning for Internet of Things. 62--68.Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Michal Zalewski. 2003. Memfetch. https://github.com/citypw/lcamtuf-memfetchGoogle ScholarGoogle Scholar

Index Terms

  1. Transforming Memory Image to Sound Wave Signals for an Effective IoT Fingerprinting

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      CODASPY '22: Proceedings of the Twelfth ACM Conference on Data and Application Security and Privacy
      April 2022
      392 pages
      ISBN:9781450392204
      DOI:10.1145/3508398

      Copyright © 2022 Owner/Author

      Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 15 April 2022

      Check for updates

      Qualifiers

      • poster

      Acceptance Rates

      Overall Acceptance Rate149of789submissions,19%

      Upcoming Conference

      CODASPY '24

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader