Firmware Security and Edge Machine Learning, how Exein is building the future of IoT Security

Introduction

The Machine Learning Engine (MLE)

  • The flow of data that identifies the way the machine learning model is exposed to the firmware level activity of the device.
  • The machine learning model that learns the device expected behavior.
  • The machinery that uses the trained ML model to identify threats or other types of anomalies in the device activity.

Gathering Data

A look inside a working u-http server through the eyes of Exein Core LSM.

CNNs and Temporal Convolutions

The kernel sliding across the input window during the convolution operation of a CNN layer.

Detecting Anomalies

Real Time Execution

A real buffer overflow attack executed on a u-http server. As soon as the attack starts (red input data) the MLE anomaly score rapidly increases and exceeds the threshold, signalling the LSM to take immediate action to stop the malicious process.

Learn More

--

--

--

The firmware security software and middleware that can be injected like a vaccine in the hardware and aims to defend it from inside.

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

Convex Labs HonestNFT Bounty: Round 4

How social media is related to violence against women

Partnership Announcement: SupraOrcales x Single Finance

Information Security Management Compliance

Announcement of LBank Listed INSUR and Airdrop 5000 USDT to Reward Users

Eavesdropping Quantum Key Distribution

Free VPN for your PC and smartphone

Q&A with Cybersecurity Expert: 2019 Threat Predictions and Data Privacy Resolutions

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Exein

Exein

The firmware security software and middleware that can be injected like a vaccine in the hardware and aims to defend it from inside.

More from Medium

RootMe — TryHackMe CTF Walkthrough

Alina POS Malware Analysis

Harvesting Credentials from Windows Credential Vault — Mimikatz

Plan for Cyber Attacks