A configurable approach to cyber-physical systems fuzzing
G Nguyen - Proceedings of the 27th ACM International Systems …, 2023 - dl.acm.org
Operational Technology has gotten a growing place in our daily lives. With the increasing
number of devices (connected or not), the need for a clean environment that allows effective …
number of devices (connected or not), the need for a clean environment that allows effective …
A Rapid Review on Software Vulnerabilities and Embedded, Cyber-Physical, and IoT Systems
A Marchetto, G Scanniello - International Conference on Product-Focused …, 2023 - Springer
This paper presents a Rapid Review (RR) conducted to identify and characterize existing
approaches and methods that discover, fix, and manage vulnerabilities in Embedded, Cyber …
approaches and methods that discover, fix, and manage vulnerabilities in Embedded, Cyber …
[PDF][PDF] Fuzzing Matter (s): A White Paper for Fuzzing the Matter Protocol.
M Maugeri - ICISSP, 2024 - scitepress.org
IoT and smart home devices have transformed daily life, consequently raising more and
more concerns about security vulnerabilities. Robust security testing methods are essential …
more concerns about security vulnerabilities. Robust security testing methods are essential …
[HTML][HTML] ARM-Based Embedded System Platform and Its Portability Research
H Liu - Journal of Computer and Communications, 2023 - scirp.org
Taking ARM as the hardware platform, the embedded system is built from both hardware
and software aspects with the application as the center. In the hardware design, build the …
and software aspects with the application as the center. In the hardware design, build the …
Comprehensive Analysis of Attacks and Defenses in IoT Sensory Big Data Analysis
This chapter takes a deep dive into the security issues surrounding IoT sensory big data
analysis, which is becoming increasingly important in today's world of ubiquitous …
analysis, which is becoming increasingly important in today's world of ubiquitous …
A low-computational cost face recognition system for high accuracy privileged access management to support the development of smart laboratories
Nowadays, privileged access management (PAM) is important for the development of smart
laboratories, especially in modern universities and research centers. A biometrics-based …
laboratories, especially in modern universities and research centers. A biometrics-based …
Insights on Cooperative Defense for Multiple Industrial Security Technologies
M Wan, M Hao, Y Li, J Zhao, Y Li - Proceedings of the 2022 12th …, 2022 - dl.acm.org
Due to the rapid development of industrial automation, ICSs (Industrial Control Systems)
gradually expose their potential security vulnerabilities, and are facing more and more …
gradually expose their potential security vulnerabilities, and are facing more and more …
Vulnerability Testing on IoT Networks Using Machine Learning Algorithm
R Mohandas, DSJD Prasanna, BV Baiju… - … on Advances in …, 2024 - ieeexplore.ieee.org
The increasing growth of Internet of Things (IoT) devices has created a wide attack surface
for cyber criminals to carry out more destructive cyber attacks; therefore, the number of cyber …
for cyber criminals to carry out more destructive cyber attacks; therefore, the number of cyber …
Evaluation of Deep Learning Techniques in Human Activity Recognition
T Mendes, N Pombo - Proceedings of SAI Intelligent Systems Conference, 2022 - Springer
The increasingly acceptance of Internet of Things (IoT) devices adversely contribute to the
accumulation of massive amounts of data which challenges for the adoption of techniques …
accumulation of massive amounts of data which challenges for the adoption of techniques …
[PDF][PDF] Fuzzing Embedded Protocols
M Szewieczek - 2024 - scholar.archive.org
Embedded systems are prevalent in all parts of modern life, consumer electronics, home
automation, and also in various safety critical areas such as medical devices or automotive …
automation, and also in various safety critical areas such as medical devices or automotive …