Embedded systems suffer from reliability issues such as variations in temperature and voltage, single event effects and component degradation, as well as being exposed to various security attacks such as control hijacking, malware, reverse engineering, eavesdropping and many others. Both reliability problems and security attacks can cause the system to behave anomalously. In this paper, we will present a detection technique that is able to detect a change in the system before the system encounters a failure, by using data from Hardware Performance Counters (HPCs). Previously, we have shown how HPC data can be used to create an execution profile of a system based on measured events and any deviation from this profile indicates an anomaly has...
Following the growth of high performance computing systems (HPC) in size and complexity, and the adv...
Over the past decades, the major objectives of computer design have been to improve performance and ...
Historically, embedded systems used to be physically isolated, and an attacker neededphysical access...
As technology scaling reaches nanometre scales,the error rate due to variations in temperature and v...
Raw data of hardware performance counters from benchmarks used in developing the early detection and...
International audienceEnergy providers are massively deploying devices to manage distributed resourc...
Embedded computing systems are very vulnerable to anomalies that can occur during execution of deplo...
Detection of malicious software (malware) has been a challenging issue over the past years due to th...
In response to the demand for higher computational power, the number of computing nodes in high perf...
Large-scale computing systems provide great potential for scientific exploration. However, the compl...
The impact of an anomaly is domain-dependent. In a dataset of network activities, an anomaly can imp...
The analysis and correct categorisation of software performance anomalies is a major challenge in cu...
International audienceThe last recent years witnessed a massive and fast deployment of Internet of T...
Large-scale computing systems provide great po-tential for scientific exploration. However, the comp...
Malware is a serious threat to network-connected embedded systems, as evidenced by the continued and...
Following the growth of high performance computing systems (HPC) in size and complexity, and the adv...
Over the past decades, the major objectives of computer design have been to improve performance and ...
Historically, embedded systems used to be physically isolated, and an attacker neededphysical access...
As technology scaling reaches nanometre scales,the error rate due to variations in temperature and v...
Raw data of hardware performance counters from benchmarks used in developing the early detection and...
International audienceEnergy providers are massively deploying devices to manage distributed resourc...
Embedded computing systems are very vulnerable to anomalies that can occur during execution of deplo...
Detection of malicious software (malware) has been a challenging issue over the past years due to th...
In response to the demand for higher computational power, the number of computing nodes in high perf...
Large-scale computing systems provide great potential for scientific exploration. However, the compl...
The impact of an anomaly is domain-dependent. In a dataset of network activities, an anomaly can imp...
The analysis and correct categorisation of software performance anomalies is a major challenge in cu...
International audienceThe last recent years witnessed a massive and fast deployment of Internet of T...
Large-scale computing systems provide great po-tential for scientific exploration. However, the comp...
Malware is a serious threat to network-connected embedded systems, as evidenced by the continued and...
Following the growth of high performance computing systems (HPC) in size and complexity, and the adv...
Over the past decades, the major objectives of computer design have been to improve performance and ...
Historically, embedded systems used to be physically isolated, and an attacker neededphysical access...