Enabling Deep Visibility into VxWorks-Based Embedded Controllers in Cyber-Physical Systems for Anomaly Detection Article Swipe
YOU?
·
· 2025
· Open Access
·
· DOI: https://doi.org/10.48550/arxiv.2504.17875
We propose the DIVER (Defensive Implant for Visibility into Embedded Run-times) framework for real-time deep visibility into embedded control devices in cyber-physical systems (CPSs). DIVER enables run-time detection of anomalies and targets devices running VxWorks real-time operating system (RTOS), precluding traditional methods of implementing dynamic monitors using OS (e.g., Linux, Windows) functions. DIVER has two components: "measurer" implant embedded into VxWorks kernel to collect run-time measurements and provide interactive/streaming interfaces over TCP/IP; remote "listener" that acquires and analyzes measurements and provides interactive user interface. DIVER focuses on small embedded devices with stringent resource constraints (e.g., insufficient storage to locally store measurements). To show efficacy and scalability of DIVER, we demonstrate on two embedded devices with different processor architectures and VxWorks versions: Motorola ACE Remote Terminal Unit used in CPS including power systems and Raspberry Pi representative of Internet-of-Things (IoT) applications.
Related Topics
- Type
- preprint
- Language
- en
- Landing Page
- http://arxiv.org/abs/2504.17875
- https://arxiv.org/pdf/2504.17875
- OA Status
- green
- OpenAlex ID
- https://openalex.org/W4416375270
Raw OpenAlex JSON
- OpenAlex ID
-
https://openalex.org/W4416375270Canonical identifier for this work in OpenAlex
- DOI
-
https://doi.org/10.48550/arxiv.2504.17875Digital Object Identifier
- Title
-
Enabling Deep Visibility into VxWorks-Based Embedded Controllers in Cyber-Physical Systems for Anomaly DetectionWork title
- Type
-
preprintOpenAlex work type
- Language
-
enPrimary language
- Publication year
-
2025Year of publication
- Publication date
-
2025-04-24Full publication date if available
- Authors
-
P. Krishnamurthy, Farshad KhorramiList of authors in order
- Landing page
-
https://arxiv.org/abs/2504.17875Publisher landing page
- PDF URL
-
https://arxiv.org/pdf/2504.17875Direct link to full text PDF
- Open access
-
YesWhether a free full text is available
- OA status
-
greenOpen access status per OpenAlex
- OA URL
-
https://arxiv.org/pdf/2504.17875Direct OA link when available
- Cited by
-
0Total citation count in OpenAlex
Full payload
| id | https://openalex.org/W4416375270 |
|---|---|
| doi | https://doi.org/10.48550/arxiv.2504.17875 |
| ids.doi | https://doi.org/10.48550/arxiv.2504.17875 |
| ids.openalex | https://openalex.org/W4416375270 |
| fwci | |
| type | preprint |
| title | Enabling Deep Visibility into VxWorks-Based Embedded Controllers in Cyber-Physical Systems for Anomaly Detection |
| biblio.issue | |
| biblio.volume | |
| biblio.last_page | |
| biblio.first_page | |
| is_xpac | False |
| apc_list | |
| apc_paid | |
| language | en |
| locations[0].id | pmh:oai:arXiv.org:2504.17875 |
| locations[0].is_oa | True |
| locations[0].source.id | https://openalex.org/S4306400194 |
| locations[0].source.issn | |
| locations[0].source.type | repository |
| locations[0].source.is_oa | True |
| locations[0].source.issn_l | |
| locations[0].source.is_core | False |
| locations[0].source.is_in_doaj | False |
| locations[0].source.display_name | arXiv (Cornell University) |
| locations[0].source.host_organization | https://openalex.org/I205783295 |
| locations[0].source.host_organization_name | Cornell University |
| locations[0].source.host_organization_lineage | https://openalex.org/I205783295 |
| locations[0].license | |
| locations[0].pdf_url | https://arxiv.org/pdf/2504.17875 |
| locations[0].version | submittedVersion |
| locations[0].raw_type | text |
| locations[0].license_id | |
| locations[0].is_accepted | False |
| locations[0].is_published | False |
| locations[0].raw_source_name | |
| locations[0].landing_page_url | http://arxiv.org/abs/2504.17875 |
| locations[1].id | doi:10.48550/arxiv.2504.17875 |
| locations[1].is_oa | True |
| locations[1].source.id | https://openalex.org/S4306400194 |
| locations[1].source.issn | |
| locations[1].source.type | repository |
| locations[1].source.is_oa | True |
| locations[1].source.issn_l | |
| locations[1].source.is_core | False |
| locations[1].source.is_in_doaj | False |
| locations[1].source.display_name | arXiv (Cornell University) |
| locations[1].source.host_organization | https://openalex.org/I205783295 |
| locations[1].source.host_organization_name | Cornell University |
| locations[1].source.host_organization_lineage | https://openalex.org/I205783295 |
| locations[1].license | |
| locations[1].pdf_url | |
| locations[1].version | |
| locations[1].raw_type | article |
| locations[1].license_id | |
| locations[1].is_accepted | False |
| locations[1].is_published | |
| locations[1].raw_source_name | |
| locations[1].landing_page_url | https://doi.org/10.48550/arxiv.2504.17875 |
| indexed_in | arxiv, datacite |
| authorships[0].author.id | https://openalex.org/A5054769060 |
| authorships[0].author.orcid | https://orcid.org/0000-0001-8264-7972 |
| authorships[0].author.display_name | P. Krishnamurthy |
| authorships[0].author_position | first |
| authorships[0].raw_author_name | Krishnamurthy, Prashanth |
| authorships[0].is_corresponding | False |
| authorships[1].author.id | https://openalex.org/A5082413942 |
| authorships[1].author.orcid | https://orcid.org/0000-0002-8418-004X |
| authorships[1].author.display_name | Farshad Khorrami |
| authorships[1].author_position | middle |
| authorships[1].raw_author_name | Khorrami, Farshad |
| authorships[1].is_corresponding | False |
| has_content.pdf | False |
| has_content.grobid_xml | False |
| is_paratext | False |
| open_access.is_oa | True |
| open_access.oa_url | https://arxiv.org/pdf/2504.17875 |
| open_access.oa_status | green |
| open_access.any_repository_has_fulltext | False |
| created_date | 2025-10-10T00:00:00 |
| display_name | Enabling Deep Visibility into VxWorks-Based Embedded Controllers in Cyber-Physical Systems for Anomaly Detection |
| has_fulltext | False |
| is_retracted | False |
| updated_date | 2025-11-28T12:30:26.040707 |
| primary_topic | |
| cited_by_count | 0 |
| locations_count | 2 |
| best_oa_location.id | pmh:oai:arXiv.org:2504.17875 |
| best_oa_location.is_oa | True |
| best_oa_location.source.id | https://openalex.org/S4306400194 |
| best_oa_location.source.issn | |
| best_oa_location.source.type | repository |
| best_oa_location.source.is_oa | True |
| best_oa_location.source.issn_l | |
| best_oa_location.source.is_core | False |
| best_oa_location.source.is_in_doaj | False |
| best_oa_location.source.display_name | arXiv (Cornell University) |
| best_oa_location.source.host_organization | https://openalex.org/I205783295 |
| best_oa_location.source.host_organization_name | Cornell University |
| best_oa_location.source.host_organization_lineage | https://openalex.org/I205783295 |
| best_oa_location.license | |
| best_oa_location.pdf_url | https://arxiv.org/pdf/2504.17875 |
| best_oa_location.version | submittedVersion |
| best_oa_location.raw_type | text |
| best_oa_location.license_id | |
| best_oa_location.is_accepted | False |
| best_oa_location.is_published | False |
| best_oa_location.raw_source_name | |
| best_oa_location.landing_page_url | http://arxiv.org/abs/2504.17875 |
| primary_location.id | pmh:oai:arXiv.org:2504.17875 |
| primary_location.is_oa | True |
| primary_location.source.id | https://openalex.org/S4306400194 |
| primary_location.source.issn | |
| primary_location.source.type | repository |
| primary_location.source.is_oa | True |
| primary_location.source.issn_l | |
| primary_location.source.is_core | False |
| primary_location.source.is_in_doaj | False |
| primary_location.source.display_name | arXiv (Cornell University) |
| primary_location.source.host_organization | https://openalex.org/I205783295 |
| primary_location.source.host_organization_name | Cornell University |
| primary_location.source.host_organization_lineage | https://openalex.org/I205783295 |
| primary_location.license | |
| primary_location.pdf_url | https://arxiv.org/pdf/2504.17875 |
| primary_location.version | submittedVersion |
| primary_location.raw_type | text |
| primary_location.license_id | |
| primary_location.is_accepted | False |
| primary_location.is_published | False |
| primary_location.raw_source_name | |
| primary_location.landing_page_url | http://arxiv.org/abs/2504.17875 |
| publication_date | 2025-04-24 |
| publication_year | 2025 |
| referenced_works_count | 0 |
| abstract_inverted_index.OS | 47 |
| abstract_inverted_index.Pi | 134 |
| abstract_inverted_index.To | 101 |
| abstract_inverted_index.We | 0 |
| abstract_inverted_index.in | 20, 127 |
| abstract_inverted_index.of | 28, 42, 106, 136 |
| abstract_inverted_index.on | 86, 110 |
| abstract_inverted_index.to | 62, 97 |
| abstract_inverted_index.we | 108 |
| abstract_inverted_index.ACE | 122 |
| abstract_inverted_index.CPS | 128 |
| abstract_inverted_index.and | 30, 66, 76, 79, 104, 118, 132 |
| abstract_inverted_index.for | 6, 12 |
| abstract_inverted_index.has | 53 |
| abstract_inverted_index.the | 2 |
| abstract_inverted_index.two | 54, 111 |
| abstract_inverted_index.Unit | 125 |
| abstract_inverted_index.deep | 14 |
| abstract_inverted_index.into | 8, 16, 59 |
| abstract_inverted_index.over | 70 |
| abstract_inverted_index.show | 102 |
| abstract_inverted_index.that | 74 |
| abstract_inverted_index.used | 126 |
| abstract_inverted_index.user | 82 |
| abstract_inverted_index.with | 90, 114 |
| abstract_inverted_index.(IoT) | 138 |
| abstract_inverted_index.DIVER | 3, 24, 52, 84 |
| abstract_inverted_index.power | 130 |
| abstract_inverted_index.small | 87 |
| abstract_inverted_index.store | 99 |
| abstract_inverted_index.using | 46 |
| abstract_inverted_index.(e.g., | 48, 94 |
| abstract_inverted_index.DIVER, | 107 |
| abstract_inverted_index.Linux, | 49 |
| abstract_inverted_index.Remote | 123 |
| abstract_inverted_index.kernel | 61 |
| abstract_inverted_index.remote | 72 |
| abstract_inverted_index.system | 37 |
| abstract_inverted_index.(CPSs). | 23 |
| abstract_inverted_index.(RTOS), | 38 |
| abstract_inverted_index.Implant | 5 |
| abstract_inverted_index.TCP/IP; | 71 |
| abstract_inverted_index.VxWorks | 34, 60, 119 |
| abstract_inverted_index.collect | 63 |
| abstract_inverted_index.control | 18 |
| abstract_inverted_index.devices | 19, 32, 89, 113 |
| abstract_inverted_index.dynamic | 44 |
| abstract_inverted_index.enables | 25 |
| abstract_inverted_index.focuses | 85 |
| abstract_inverted_index.implant | 57 |
| abstract_inverted_index.locally | 98 |
| abstract_inverted_index.methods | 41 |
| abstract_inverted_index.propose | 1 |
| abstract_inverted_index.provide | 67 |
| abstract_inverted_index.running | 33 |
| abstract_inverted_index.storage | 96 |
| abstract_inverted_index.systems | 22, 131 |
| abstract_inverted_index.targets | 31 |
| abstract_inverted_index.Embedded | 9 |
| abstract_inverted_index.Motorola | 121 |
| abstract_inverted_index.Terminal | 124 |
| abstract_inverted_index.Windows) | 50 |
| abstract_inverted_index.acquires | 75 |
| abstract_inverted_index.analyzes | 77 |
| abstract_inverted_index.efficacy | 103 |
| abstract_inverted_index.embedded | 17, 58, 88, 112 |
| abstract_inverted_index.monitors | 45 |
| abstract_inverted_index.provides | 80 |
| abstract_inverted_index.resource | 92 |
| abstract_inverted_index.run-time | 26, 64 |
| abstract_inverted_index.Raspberry | 133 |
| abstract_inverted_index.anomalies | 29 |
| abstract_inverted_index.detection | 27 |
| abstract_inverted_index.different | 115 |
| abstract_inverted_index.framework | 11 |
| abstract_inverted_index.including | 129 |
| abstract_inverted_index.operating | 36 |
| abstract_inverted_index.processor | 116 |
| abstract_inverted_index.real-time | 13, 35 |
| abstract_inverted_index.stringent | 91 |
| abstract_inverted_index.versions: | 120 |
| abstract_inverted_index."listener" | 73 |
| abstract_inverted_index."measurer" | 56 |
| abstract_inverted_index.(Defensive | 4 |
| abstract_inverted_index.Run-times) | 10 |
| abstract_inverted_index.Visibility | 7 |
| abstract_inverted_index.functions. | 51 |
| abstract_inverted_index.interface. | 83 |
| abstract_inverted_index.interfaces | 69 |
| abstract_inverted_index.precluding | 39 |
| abstract_inverted_index.visibility | 15 |
| abstract_inverted_index.components: | 55 |
| abstract_inverted_index.constraints | 93 |
| abstract_inverted_index.demonstrate | 109 |
| abstract_inverted_index.interactive | 81 |
| abstract_inverted_index.scalability | 105 |
| abstract_inverted_index.traditional | 40 |
| abstract_inverted_index.implementing | 43 |
| abstract_inverted_index.insufficient | 95 |
| abstract_inverted_index.measurements | 65, 78 |
| abstract_inverted_index.applications. | 139 |
| abstract_inverted_index.architectures | 117 |
| abstract_inverted_index.cyber-physical | 21 |
| abstract_inverted_index.measurements). | 100 |
| abstract_inverted_index.representative | 135 |
| abstract_inverted_index.Internet-of-Things | 137 |
| abstract_inverted_index.interactive/streaming | 68 |
| cited_by_percentile_year | |
| countries_distinct_count | 0 |
| institutions_distinct_count | 2 |
| citation_normalized_percentile |