[HTML][HTML] A systematic literature review on wireless security testbeds in the cyber-physical realm
Abstract The Cyber-Physical System (CPS) lies in the core of Industry 4.0, accelerating the
convergence of formerly barricaded operational technology systems with modern …
convergence of formerly barricaded operational technology systems with modern …
Detecting compromised IoT devices: Existing techniques, challenges, and a way forward
IoT devices, whether connected to the Internet or operating in a private network, are
vulnerable to cyber attacks from external or internal attackers or insiders who may succeed …
vulnerable to cyber attacks from external or internal attackers or insiders who may succeed …
{ARI}: Attestation of Real-time Mission Execution Integrity
With the proliferation of autonomous safety-critical cyber-physical systems (CPS) in our daily
life, their security is becoming ever more important. Remote attestation is a powerful …
life, their security is becoming ever more important. Remote attestation is a powerful …
[HTML][HTML] PROVE: Provable remote attestation for public verifiability
The expanding attack surface of Internet of Things (IoT) systems calls for innovative security
approaches to verify the reliability of IoT devices. To this end, Remote Attestation (RA) …
approaches to verify the reliability of IoT devices. To this end, Remote Attestation (RA) …
Techniques for Enhancing Security in Industrial Control Systems
V Varadharajan, U Tupakula… - ACM Transactions on …, 2024 - dl.acm.org
Increasingly Industrial Control Systems (ICS) systems are being connected to the Internet to
minimise the operational costs and provide additional flexibility. These control systems such …
minimise the operational costs and provide additional flexibility. These control systems such …
Vulnerability detection in cyber-physical system using machine learning
V Bharathi - Scalable Computing: Practice and Experience, 2024 - scpe.org
The cyber-physical system is a specific type of IoT communication environment that deals
with communication through innovative healthcare (medical) devices. The traditional …
with communication through innovative healthcare (medical) devices. The traditional …
[PDF][PDF] A Survey on Security Threats in the internet of medical things (IoMT)
Recent developments in the Internet of Things (IoT) have led to the development of the
Internet of Medical Things (IoMT). Data collection, analysis, and transmission are key …
Internet of Medical Things (IoMT). Data collection, analysis, and transmission are key …
Raft: Hardware-assisted Dynamic Information Flow Tracking for Runtime Protection on RISC-V
Dynamic Information Flow Tracking (DIFT) is a fundamental computer security technique that
tracks the data flow of interest at runtime, overcoming the limitations of discovering data …
tracks the data flow of interest at runtime, overcoming the limitations of discovering data …
[PDF][PDF] IDA: Hybrid Attestation with Support for Interrupts and TOCTOU
F Arkannezhad, J Feng… - Network and Distributed …, 2024 - ndss-symposium.org
Remote attestation has received much attention recently due to the proliferation of
embedded and IoT devices. Among various solutions, methods based on hardware-software …
embedded and IoT devices. Among various solutions, methods based on hardware-software …
Teamwork Makes TEE Work: Open and Resilient Remote Attestation on Decentralized Trust
X Zhang, K Qin, S Qu, T Wang, C Zhang… - arXiv preprint arXiv …, 2024 - arxiv.org
Remote Attestation (RA) enables the integrity and authenticity of applications in Trusted
Execution Environment (TEE) to be verified. Existing TEE RA designs employ a centralized …
Execution Environment (TEE) to be verified. Existing TEE RA designs employ a centralized …