For embedded system software development

Integrated Solutions

From project management to design and verification for international standards compliance!

AI-powered cyber threat detection solution

P2Scan

A next-generation cybersecurity solution combining machine learning with power analysis (Power Fingerprinting) technology


#Cybersecurity #ThreatDetection #SupplyChainSecurity #Security #PredictiveMaintenance #MachineLearning #PowerFingerprinting #PowerAnalysis

Modern cyberattacks are evolving beyond software to include tampering and manipulation of internal hardware and system domains such as CPU, memory, FPGA, firmware, and BIOS. Traditional security solutions have limitations in detecting these threats. PFP Cybersecurity’s P2Scan analyzes power patterns generated during system operation using machine learning and identifies even unknown threats by detecting subtle deviations from normal behavior.

Overview

1
Threat detection for hardware changes
• When unauthorized components are added to hardware, electromagnetic emission patterns change
• Even when tampered products are swapped in for genuine products, EM emissions and power consumption patterns change—enabling verification of whether genuine components are being used
2
Threat detection for software changes
• When firmware is modified, software behavior changes and power consumption patterns shift accordingly
• Even minimal software changes inevitably alter power consumption patterns, making it possible to distinguish from 정상 behavior

Key Features

1
Superior threat detection capability
• Precisely analyze normal operation and even subtle anomalies using machine-learning-based power data analysis (Power Fingerprinting). Effectively identify threats at the hardware, firmware, and BIOS levels that are difficult to detect with conventional security solutions.
2
Clearly distinguish tampered behavior
• Learn the power patterns of system components such as CPU, memory, and FPGA to clearly distinguish normal behavior from maliciously tampered behavior. Detect hidden attacks such as code injection, configuration changes, and unauthorized firmware tampering.
3
Real-time monitoring
• Analyze system power signals in real time to enable immediate detection when security anomalies occur. Identify attack timing quickly to support rapid response and minimize impact.
4
Cloud-based multi-threat monitoring
• Centrally manage multiple devices and environments through a cloud-based monitoring system and detect diverse security threats simultaneously. Centralized oversight enables efficient security operations even at scale.

Key Capabilities

1
Machine-learning-based signal analysis
• Apply PFP Cybersecurity’s specialized machine-learning algorithms to precisely analyze power and electromagnetic signals

• Learn and analyze even subtle pattern differences that are difficult to identify with traditional rule-based approaches
2
Generate Power Fingerprints from power and EM signals
• Collect power data and electromagnetic signals generated by devices to create unique Power Fingerprints

• Distinguish device operating states with extremely small signal changes to accurately identify normal vs. abnormal behavior
3
Real-time anomaly detection
• Immediately detect abnormal patterns by comparing pre-generated Power Fingerprints with real-time measured signals

• Enable rapid awareness and response at the moment a threat occurs
4
Detect hardware and firmware tampering
• Precisely measure signal differences caused by firmware modification or hardware changes

• Clearly distinguish genuine products from tampered/counterfeit products to effectively detect compromised equipment

Industries

Use Cases

1
Defense
Frequent security threats occurred due to supply-chain attacks or insider attacks against naval ship communication equipment delivered to the Navy. Using this solution, hardware/software tampering was inspected on the production line and operating environments were monitored in real time to help prevent insider attacks.
2
Defense
Increasing risk of PC BIOS attacks (e.g., Lojax malware) against PCs used by major U.S. government agencies. This solution helped assess whether military PCs delivered for defense use had BIOS changes or infections caused by hacking, viruses, or malware.
3
Industrial Control Systems
As with Stuxnet, viruses on PLCs or control devices can cause large-scale damage in critical industries, making real-time monitoring essential. This solution monitored virus infection attacks and supported real-time response.
4
IoT
In situations where IoT devices risk becoming zombie PCs due to malware such as the MIRAI botnet, and it is difficult to change or modify HW/SW to strengthen security, the PFP solution was applied to detect abnormal behavior through real-time monitoring and build an 운영 environment via this solution 대
5
Network
In environments where source code review is difficult due to the complexity of embedded Linux, and abnormal behavior is suspected but hard to reproduce and trace, P2Scan detected that a backdoor executed when a specific command was run via the command line.
6
Network
Some in-use network equipment showed frequent failures and unusually low quality in certain devices despite being from the same manufacturer. Investigation using P2Scan found that about 30% of devices for a specific model had been supplied as counterfeits.

Share MDS Intelligence content on your SNS!

MDS Intelligence Contact

Contact Us Directly

An MDS Intelligence specialist will assist you accurately and promptly.

Inquire About P2Scan