MEDA: A Machine Emulation Detection Algorithm

Valerio Selis, Alan Marshall

2015

Abstract

Security in the Internet of Things (IoT) is now considered a priority, and trust in machine-to-machine (M2M) communications is expected to play a key role. This paper presents a mechanism to detect an emerging threat in M2M systems whereby an attacker may create multiple fake embedded machines using virtualized or emulated systems, in order to compromise either a targeted IoT device, or the M2M network. A new trust method is presented that is based on a characterisation of the behaviours of real embedded machines, and operates independently of their architectures and operating systems, in order to detect virtual and emulated systems. A range of tests designed to characterise embedded and virtual devices are presented, and the results underline the efficiency of the proposed solution for detecting these systems easily and quickly.

Download


Paper Citation


in Harvard Style

Selis V. and Marshall A. (2015). MEDA: A Machine Emulation Detection Algorithm . In Proceedings of the 12th International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2015) ISBN 978-989-758-117-5, pages 228-235. DOI: 10.5220/0005535202280235

in Bibtex Style

@conference{secrypt15,
author={Valerio Selis and Alan Marshall},
title={MEDA: A Machine Emulation Detection Algorithm},
booktitle={Proceedings of the 12th International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2015)},
year={2015},
pages={228-235},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0005535202280235},
isbn={978-989-758-117-5},
}


in EndNote Style

TY - CONF
JO - Proceedings of the 12th International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2015)
TI - MEDA: A Machine Emulation Detection Algorithm
SN - 978-989-758-117-5
AU - Selis V.
AU - Marshall A.
PY - 2015
SP - 228
EP - 235
DO - 10.5220/0005535202280235