Ph.D. Proposal Oral Exam - Taimour Wehbe

*********************************
There is now a CONTENT FREEZE for Mercury while we switch to a new platform. It began on Friday, March 10 at 6pm and will end on Wednesday, March 15 at noon. No new content can be created during this time, but all material in the system as of the beginning of the freeze will be migrated to the new platform, including users and groups. Functionally the new site is identical to the old one. webteam@gatech.edu
*********************************

Event Details
  • Date/Time:
    • Thursday November 16, 2017 - Friday November 17, 2017
      11:00 am - 12:59 pm
  • Location: Room 1123, Klaus
  • Phone:
  • URL:
  • Email:
  • Fee(s):
    N/A
  • Extras:
Contact
No contact information submitted.
Summaries

Summary Sentence: Medical Device Security Through Hardware Signatures

Full Summary: No summary paragraph submitted.

Title:  Medical Device Security Through Hardware Signatures

Committee: 

Dr. Mooney, Advisor

Dr. Keezer, Co- Advisor         

Dr. Saltaformaggio, Chair

Dr. Inan

Abstract:

The objective of the proposed research is to design signature-based techniques to detect run-time software and hardware malicious modifications in embedded medical devices. Specifically, the proposed hardware-based signature generation architecture helps in detecting and distinguishing extremely small hardware Trojan (HT) attacks and errors from health problems in medical devices. In addition, the proposed architecture provides a hardware-assisted technique for detecting run-time malicious code modifications on applications running on the operating system of the embedded medical device. In the preliminary work, three types of signature generation techniques, namely, analog-, digital- and physiological-based signatures were designed, simulated, and synthesized. In the future work, the architecture will be expanded such that a hardware monitor is designed and attached to the medical device's main memory system. The monitor creates page-based signatures of the code running on the system at compile-time and stores them in a secure database. It then checks for the integrity of the code pages at run-time by regenerating the page-based signatures and comparing them to the legitimate signatures. Preliminary results show that the proposed overall embedded architecture provides a successful approach to detecting malicious modifications in real-time without incurring significant area and performance overhead. Both, the developed and the proposed work will improve consumer confidence in health monitoring applications by increasing the assurance provided to the public that their health data are safely captured and processed.

Additional Information

In Campus Calendar
No
Groups

ECE Ph.D. Proposal Oral Exams

Invited Audience
Public
Categories
Other/Miscellaneous
Keywords
Phd proposal, graduate students
Status
  • Created By: Daniela Staiculescu
  • Workflow Status: Published
  • Created On: Nov 10, 2017 - 5:04pm
  • Last Updated: Nov 10, 2017 - 5:04pm