{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,16]],"date-time":"2025-09-16T17:38:29Z","timestamp":1758044309528,"version":"3.44.0"},"reference-count":48,"publisher":"Association for Computing Machinery (ACM)","issue":"5","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Embed. Comput. Syst."],"published-print":{"date-parts":[[2025,9,30]]},"abstract":"<jats:p>This article presents a new paradigm for abnormality detection using a novel power signature that characterizes the rising and descending patterns of energy consumption. The proposed methodology includes a low-overhead power signature generation circuit, computation-light analysis methods, and optimal generation of the golden signature used in the analysis. The proposed power signature generation circuit is designed using 90 nm CMOS technology, and its operation is validated via circuit simulations. The effectiveness of the proposed method in detecting the insertion of potentially malicious code is demonstrated with data obtained from hardware experiments and circuit simulations.<\/jats:p>","DOI":"10.1145\/3711834","type":"journal-article","created":{"date-parts":[[2025,1,24]],"date-time":"2025-01-24T06:41:47Z","timestamp":1737700907000},"page":"1-18","update-policy":"https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Abnormality Detection Using Power Rising and Descending Signature (PRIDES)"],"prefix":"10.1145","volume":"24","author":[{"ORCID":"https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/orcid.org\/0009-0009-4866-1944","authenticated-orcid":false,"given":"Ashish","family":"Mahanta","sequence":"first","affiliation":[{"name":"School of Electrical, Computer & Biomedical Engineering, Southern Illinois University Carbondale","place":["Carbondale, United States"]}]},{"ORCID":"https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/orcid.org\/0000-0003-1780-7663","authenticated-orcid":false,"given":"Haibo","family":"Wang","sequence":"additional","affiliation":[{"name":"School of Electrical, Computer & Biomedical Engineering, Southern Illinois University Carbondale","place":["Carbondale, United States"]}]}],"member":"320","published-online":{"date-parts":[[2025,9,12]]},"reference":[{"key":"e_1_3_2_2_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2017.04.002"},{"key":"e_1_3_2_3_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.phycom.2023.102069"},{"key":"e_1_3_2_4_2","doi-asserted-by":"publisher","DOI":"10.1007\/s43926-022-00021-2"},{"key":"e_1_3_2_5_2","doi-asserted-by":"publisher","DOI":"10.1145\/3663673"},{"key":"e_1_3_2_6_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3217212"},{"key":"e_1_3_2_7_2","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom\/BigDataSE.2018.00250"},{"key":"e_1_3_2_8_2","unstructured":"CISecurity Center for Internet Security. 2021. The Mirai botnet: threats and mitigations. Retrieved from https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/www.cisecurity.org\/insights\/blog\/the-mirai-botnet-threats-and-mitigations"},{"key":"e_1_3_2_9_2","volume-title":"USENIX Workshop on Health Information Technologies (HealthTech\u201913)","author":"Clark S. S.","year":"2013","unstructured":"S. S. Clark, B. Ransford, A. Rahmati, S. Guineau, J. Sorber, W. Xu, and K. Fu. 2013. WattsUpDoc: Power side channels to nonintrusively discover untargeted malware on embedded medical devices. In USENIX Workshop on Health Information Technologies (HealthTech\u201913). USENIX Association."},{"key":"e_1_3_2_10_2","doi-asserted-by":"publisher","DOI":"10.1145\/3320269.3384727"},{"key":"e_1_3_2_11_2","doi-asserted-by":"publisher","DOI":"10.3390\/s23218958"},{"key":"e_1_3_2_12_2","volume-title":"Internet of Things (IoT) Market Size, Share & Industry Analysis, by Component (Platform and Solution & Services), by Deployment (On-premise and Cloud), by Enterprise Type (SMEs and Large), by Industry (BFSI, Retail, Government, Healthcare, Manufacturing, Agriculture, Sustainable Energy, Transportation, IT & Telecom, and Others), and Regional Forecast, 2024\u20132032","author":"Insights Fortune Business","year":"2024","unstructured":"Fortune Business Insights. 2024. Internet of Things (IoT) Market Size, Share & Industry Analysis, by Component (Platform and Solution & Services), by Deployment (On-premise and Cloud), by Enterprise Type (SMEs and Large), by Industry (BFSI, Retail, Government, Healthcare, Manufacturing, Agriculture, Sustainable Energy, Transportation, IT & Telecom, and Others), and Regional Forecast, 2024\u20132032. Industry Report FBI100307. Fortune Business Insights. Retrieved from https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/www.fortunebusinessinsights.com\/industry-reports\/internet-of-things-iot-market-100307"},{"key":"e_1_3_2_13_2","doi-asserted-by":"publisher","DOI":"10.1145\/3400302.3415692"},{"key":"e_1_3_2_14_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-81293-5_10"},{"key":"e_1_3_2_15_2","article-title":"Hybrid statistical-machine learning for real-time anomaly detection in industrial cyber-physical systems","author":"Hao Weijie","year":"2021","unstructured":"Weijie Hao, Tao Yang, and Qiang Yang. 2021. Hybrid statistical-machine learning for real-time anomaly detection in industrial cyber-physical systems. IEEE Trans. Autom. Sci. Eng. 20, 1 (2021), 32\u201346.","journal-title":"IEEE Trans. Autom. Sci. Eng."},{"key":"e_1_3_2_16_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICDIS.2019.00016"},{"key":"e_1_3_2_17_2","unstructured":"Michael Holloway. 2015. Stuxnet worm attack on Iranian nuclear facilities. Retrieved from https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/http\/large.stanford.edu\/courses\/2015\/ph241\/holloway1\/"},{"key":"e_1_3_2_18_2","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2012.2190117"},{"key":"e_1_3_2_19_2","doi-asserted-by":"publisher","DOI":"10.1109\/ITC-Asia51099.2020.00025"},{"key":"e_1_3_2_20_2","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAS51556.2021.9401474"},{"key":"e_1_3_2_21_2","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48405-1_25"},{"key":"e_1_3_2_22_2","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2020.3018092"},{"key":"e_1_3_2_23_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICNWC57852.2023.10127492"},{"key":"e_1_3_2_24_2","doi-asserted-by":"publisher","DOI":"10.1109\/FRUCT-ISPIT.2016.7561525"},{"issue":"1","key":"e_1_3_2_25_2","first-page":"85","article-title":"IoT in agriculture: The future of precision monitoring and data-driven farming","volume":"7","author":"Liang Chen","year":"2023","unstructured":"Chen Liang and Tufail Shah. 2023. IoT in agriculture: The future of precision monitoring and data-driven farming. Eigenpub Rev. Sci. Technol. 7, 1 (2023), 85\u2013104.","journal-title":"Eigenpub Rev. Sci. Technol."},{"key":"e_1_3_2_26_2","doi-asserted-by":"publisher","DOI":"10.1109\/PAINE56030.2022.10014854"},{"key":"e_1_3_2_27_2","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978299"},{"key":"e_1_3_2_28_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2971665"},{"key":"e_1_3_2_29_2","volume-title":"Power Analysis Attacks: Revealing the Secrets of Smart Cards","author":"Mangard S.","year":"2007","unstructured":"S. Mangard, E. Oswald, and T. Popp. 2007. Power Analysis Attacks: Revealing the Secrets of Smart Cards. Springer Science & Business Media."},{"key":"e_1_3_2_30_2","first-page":"3","volume-title":"6th ACM Workshop on Security, Privacy, & Dependability for Cyber Vehicles","author":"Moos T.","year":"2019","unstructured":"T. Moos, G. Sigl, and M. St\u00f6ttinger. 2019. Power-based anomaly detection for embedded devices. In 6th ACM Workshop on Security, Privacy, & Dependability for Cyber Vehicles. 3\u201312."},{"key":"e_1_3_2_31_2","doi-asserted-by":"publisher","DOI":"10.1002\/9781119893998.ch13"},{"key":"e_1_3_2_32_2","doi-asserted-by":"publisher","DOI":"10.1109\/MCE.2017.2684982"},{"key":"e_1_3_2_33_2","doi-asserted-by":"publisher","DOI":"10.1145\/3195970.3196094"},{"key":"e_1_3_2_34_2","doi-asserted-by":"publisher","DOI":"10.1109\/ISCCSP.2010.5463484"},{"key":"e_1_3_2_35_2","doi-asserted-by":"publisher","DOI":"10.1145\/1015047.1015049"},{"key":"e_1_3_2_36_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2023.100721"},{"key":"e_1_3_2_37_2","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2011.291"},{"key":"e_1_3_2_38_2","doi-asserted-by":"publisher","DOI":"10.1109\/WOCN.2016.7759894"},{"key":"e_1_3_2_39_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2014.11.008"},{"volume-title":"2024 SonicWall Mid-Year Cyber Threat Report","year":"2024","key":"e_1_3_2_40_2","unstructured":"SonicWall. 2024. 2024 SonicWall Mid-Year Cyber Threat Report. Technical Report. SonicWall. Retrieved from https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/www.sonicwall.com\/threat-report"},{"key":"e_1_3_2_41_2","unstructured":"ARM T. Ban. 2020. HW Fault Injection Mitigation - Trusted Firmware M. https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/www.trustedfirmware.org\/docs\/TFM_fault_injection_mitigation.pdf. Accessed: December 01 2024."},{"key":"e_1_3_2_42_2","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2018.2883971"},{"key":"e_1_3_2_43_2","doi-asserted-by":"publisher","DOI":"10.1109\/DFT.2008.61"},{"key":"e_1_3_2_44_2","volume-title":"The Hardware Hacking Handbook\u2014Breaking Embedded Security with Hardware Attacks","author":"Woudenberg J. V.","year":"2022","unstructured":"J. V. Woudenberg and C. O\u2019Flynn. 2022. The Hardware Hacking Handbook\u2014Breaking Embedded Security with Hardware Attacks. No Starch Press."},{"key":"e_1_3_2_45_2","doi-asserted-by":"publisher","DOI":"10.1631\/FITEE.1601540"},{"key":"e_1_3_2_46_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2694844"},{"key":"e_1_3_2_47_2","first-page":"151","article-title":"Understanding Analog Side Channels Using Cryptography Algorithms","author":"Zajic Alenka","year":"2023","unstructured":"Alenka Zajic and Milos Prvulovic. 2023. Understanding Analog Side Channels Using Cryptography Algorithms.Springer International Publishing, 151\u2013209.","journal-title":"Springer International Publishing"},{"key":"e_1_3_2_48_2","doi-asserted-by":"publisher","DOI":"10.1109\/IEEE-IWS.2018.8400824"},{"key":"e_1_3_2_49_2","first-page":"190","volume-title":"IEEE Conference on Communications and Network Security (CNS\u201917)","author":"Zuo C.","year":"2017","unstructured":"C. Zuo, M. Ma, F. Gao, and X. Guan. 2017. Anomaly detection in cyber-physical systems using side-channel monitoring. In IEEE Conference on Communications and Network Security (CNS\u201917). 190\u2013198."}],"container-title":["ACM Transactions on Embedded Computing Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/dl.acm.org\/doi\/pdf\/10.1145\/3711834","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,12]],"date-time":"2025-09-12T11:44:14Z","timestamp":1757677454000},"score":1,"resource":{"primary":{"URL":"https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/dl.acm.org\/doi\/10.1145\/3711834"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9,12]]},"references-count":48,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2025,9,30]]}},"alternative-id":["10.1145\/3711834"],"URL":"https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/doi.org\/10.1145\/3711834","relation":{},"ISSN":["1539-9087","1558-3465"],"issn-type":[{"type":"print","value":"1539-9087"},{"type":"electronic","value":"1558-3465"}],"subject":[],"published":{"date-parts":[[2025,9,12]]},"assertion":[{"value":"2024-02-16","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-12-16","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-09-12","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}