etc.) to insert malicious commands on end devices. Advanced software-based detection
schemes (deeper operating system level) are used to identify the malicious nature of such
mimic devices. However, a powerful adversary (eg, as rootkits or advanced persistent
threats) can subvert those software-based detection schemes. To address these concerns,
we present our ongoing work to dynamically detect these threats in hardware. Specifically …