A Stochastic-Process Methodology for Detecting Anomalies at Runtime in Embedded Systems
Embedded computing systems are very vulnerable to anomalies that can occur during execution of deployed software. Anomalies can be due, for example, to faults, bugs or deadlocks during executions. These anomalies can have very dangerous consequences on the systems controlled by embedded computing de...
Saved in:
| Main Authors: | , , , |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Islamic Azad University, Bandar Abbas Branch
2024-11-01
|
| Series: | Transactions on Fuzzy Sets and Systems |
| Subjects: | |
| Online Access: | https://sanad.iau.ir/journal/tfss/Article/1183368 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| _version_ | 1846172771446423552 |
|---|---|
| author | Alfredo Cuzzocrea Enzo Mumolo Islam Belmerabet Abderraouf Hafsaoui |
| author_facet | Alfredo Cuzzocrea Enzo Mumolo Islam Belmerabet Abderraouf Hafsaoui |
| author_sort | Alfredo Cuzzocrea |
| collection | DOAJ |
| description | Embedded computing systems are very vulnerable to anomalies that can occur during execution of deployed software. Anomalies can be due, for example, to faults, bugs or deadlocks during executions. These anomalies can have very dangerous consequences on the systems controlled by embedded computing devices. Embedded systems are designed to perform autonomously, i.e., without any human intervention, and thus the possibility of debugging an application to manage the anomaly is very difficult, if not impossible. Anomaly detection algorithms are the primary means of being aware of anomalous conditions. In this paper, we describe a novel approach for detecting an anomaly during the execution of one or more applications. The algorithm exploits the differences in the behavior of memory reference sequences generated during executions. Memory reference sequences are monitored in real-time using the PIN tracing tool. The memory reference sequence is divided into randomly-selected blocks and spectrally described with the Discrete Cosine Transform (DCT) [36]. Experimental analysis performed on various benchmarks shows very low error rates for the anomalies tested. |
| format | Article |
| id | doaj-art-d8c0e4a128e9462285e3fa8bb2ecd095 |
| institution | Kabale University |
| issn | 2821-0131 |
| language | English |
| publishDate | 2024-11-01 |
| publisher | Islamic Azad University, Bandar Abbas Branch |
| record_format | Article |
| series | Transactions on Fuzzy Sets and Systems |
| spelling | doaj-art-d8c0e4a128e9462285e3fa8bb2ecd0952024-11-09T06:38:37ZengIslamic Azad University, Bandar Abbas BranchTransactions on Fuzzy Sets and Systems2821-01312024-11-0132142171A Stochastic-Process Methodology for Detecting Anomalies at Runtime in Embedded SystemsAlfredo CuzzocreaEnzo MumoloIslam BelmerabetAbderraouf HafsaouiEmbedded computing systems are very vulnerable to anomalies that can occur during execution of deployed software. Anomalies can be due, for example, to faults, bugs or deadlocks during executions. These anomalies can have very dangerous consequences on the systems controlled by embedded computing devices. Embedded systems are designed to perform autonomously, i.e., without any human intervention, and thus the possibility of debugging an application to manage the anomaly is very difficult, if not impossible. Anomaly detection algorithms are the primary means of being aware of anomalous conditions. In this paper, we describe a novel approach for detecting an anomaly during the execution of one or more applications. The algorithm exploits the differences in the behavior of memory reference sequences generated during executions. Memory reference sequences are monitored in real-time using the PIN tracing tool. The memory reference sequence is divided into randomly-selected blocks and spectrally described with the Discrete Cosine Transform (DCT) [36]. Experimental analysis performed on various benchmarks shows very low error rates for the anomalies tested.https://sanad.iau.ir/journal/tfss/Article/1183368anomaly detection embedded systems stochastic processes inference models. |
| spellingShingle | Alfredo Cuzzocrea Enzo Mumolo Islam Belmerabet Abderraouf Hafsaoui A Stochastic-Process Methodology for Detecting Anomalies at Runtime in Embedded Systems Transactions on Fuzzy Sets and Systems anomaly detection embedded systems stochastic processes inference models. |
| title | A Stochastic-Process Methodology for Detecting Anomalies at Runtime in Embedded Systems |
| title_full | A Stochastic-Process Methodology for Detecting Anomalies at Runtime in Embedded Systems |
| title_fullStr | A Stochastic-Process Methodology for Detecting Anomalies at Runtime in Embedded Systems |
| title_full_unstemmed | A Stochastic-Process Methodology for Detecting Anomalies at Runtime in Embedded Systems |
| title_short | A Stochastic-Process Methodology for Detecting Anomalies at Runtime in Embedded Systems |
| title_sort | a stochastic process methodology for detecting anomalies at runtime in embedded systems |
| topic | anomaly detection embedded systems stochastic processes inference models. |
| url | https://sanad.iau.ir/journal/tfss/Article/1183368 |
| work_keys_str_mv | AT alfredocuzzocrea astochasticprocessmethodologyfordetectinganomaliesatruntimeinembeddedsystems AT enzomumolo astochasticprocessmethodologyfordetectinganomaliesatruntimeinembeddedsystems AT islambelmerabet astochasticprocessmethodologyfordetectinganomaliesatruntimeinembeddedsystems AT abderraoufhafsaoui astochasticprocessmethodologyfordetectinganomaliesatruntimeinembeddedsystems |