A configurable approach to cyber-physical systems fuzzing

G Nguyen - Proceedings of the 27th ACM International Systems …, 2023 - dl.acm.org
Operational Technology has gotten a growing place in our daily lives. With the increasing
number of devices (connected or not), the need for a clean environment that allows effective …

A Rapid Review on Software Vulnerabilities and Embedded, Cyber-Physical, and IoT Systems

A Marchetto, G Scanniello - International Conference on Product-Focused …, 2023 - Springer
This paper presents a Rapid Review (RR) conducted to identify and characterize existing
approaches and methods that discover, fix, and manage vulnerabilities in Embedded, Cyber …

[PDF][PDF] Fuzzing Matter (s): A White Paper for Fuzzing the Matter Protocol.

M Maugeri - ICISSP, 2024 - scitepress.org
IoT and smart home devices have transformed daily life, consequently raising more and
more concerns about security vulnerabilities. Robust security testing methods are essential …

[HTML][HTML] ARM-Based Embedded System Platform and Its Portability Research

H Liu - Journal of Computer and Communications, 2023 - scirp.org
Taking ARM as the hardware platform, the embedded system is built from both hardware
and software aspects with the application as the center. In the hardware design, build the …

Comprehensive Analysis of Attacks and Defenses in IoT Sensory Big Data Analysis

M Ishrat, W Khan, F Ahmad, MM Al Farsi… - … Advancements in Data …, 2024 - igi-global.com
This chapter takes a deep dive into the security issues surrounding IoT sensory big data
analysis, which is becoming increasingly important in today's world of ubiquitous …

A low-computational cost face recognition system for high accuracy privileged access management to support the development of smart laboratories

MY Mustar, KT Putra, Y Ardiyanto, RO Wiyagi… - AIP Conference …, 2023 - pubs.aip.org
Nowadays, privileged access management (PAM) is important for the development of smart
laboratories, especially in modern universities and research centers. A biometrics-based …

Insights on Cooperative Defense for Multiple Industrial Security Technologies

M Wan, M Hao, Y Li, J Zhao, Y Li - Proceedings of the 2022 12th …, 2022 - dl.acm.org
Due to the rapid development of industrial automation, ICSs (Industrial Control Systems)
gradually expose their potential security vulnerabilities, and are facing more and more …

Vulnerability Testing on IoT Networks Using Machine Learning Algorithm

R Mohandas, DSJD Prasanna, BV Baiju… - … on Advances in …, 2024 - ieeexplore.ieee.org
The increasing growth of Internet of Things (IoT) devices has created a wide attack surface
for cyber criminals to carry out more destructive cyber attacks; therefore, the number of cyber …

Evaluation of Deep Learning Techniques in Human Activity Recognition

T Mendes, N Pombo - Proceedings of SAI Intelligent Systems Conference, 2022 - Springer
The increasingly acceptance of Internet of Things (IoT) devices adversely contribute to the
accumulation of massive amounts of data which challenges for the adoption of techniques …

[PDF][PDF] Fuzzing Embedded Protocols

M Szewieczek - 2024 - scholar.archive.org
Embedded systems are prevalent in all parts of modern life, consumer electronics, home
automation, and also in various safety critical areas such as medical devices or automotive …