Power fluctuations spot malware in embedded systems

Power fluctuations in embedded systems are being tracked to detect a form of malware that uses a system’s architecture to side-step security measures.

embedded systems
Power fluctuations are monitored to mitigate against micro-architectural attacks (Image by Gerd Altmann, Pixabay)

The advance from North Carolina State University and the University of Texas at Austin detects micro-architectural attacks, a type of malware that takes over hardware and hands control of the system - and access to its data – to an outside source.

“Embedded systems are used in everything from the voice-activated virtual assistants in our homes to industrial control systems like those used in power plants,” said Aydin Aysu, co-author of a paper on the work and an assistant professor of electrical and computer engineering at NC State. “And malware that targets those systems can be used to seize control of these systems or to steal information.”

Spectre and Meltdown are high-profile examples of micro-architectural malware.

Register now to continue reading

Thanks for visiting The Engineer. You’ve now reached your monthly limit of news stories. Register for free to unlock unlimited access to all of our news coverage, as well as premium content including opinion, in-depth features and special reports.  

Benefits of registering

  • In-depth insights and coverage of key emerging trends

  • Unrestricted access to special reports throughout the year

  • Daily technology news delivered straight to your inbox