[HTML][HTML] A systematic literature review on wireless security testbeds in the cyber-physical realm

V Kampourakis, V Gkioulos, S Katsikas - Computers & Security, 2023 - Elsevier
Abstract The Cyber-Physical System (CPS) lies in the core of Industry 4.0, accelerating the
convergence of formerly barricaded operational technology systems with modern …

Detecting compromised IoT devices: Existing techniques, challenges, and a way forward

I Makhdoom, M Abolhasan, D Franklin, J Lipman… - Computers & …, 2023 - Elsevier
IoT devices, whether connected to the Internet or operating in a private network, are
vulnerable to cyber attacks from external or internal attackers or insiders who may succeed …

{ARI}: Attestation of Real-time Mission Execution Integrity

J Wang, Y Wang, A Li, Y Xiao, R Zhang, W Lou… - 32nd USENIX Security …, 2023 - usenix.org
With the proliferation of autonomous safety-critical cyber-physical systems (CPS) in our daily
life, their security is becoming ever more important. Remote attestation is a powerful …

[HTML][HTML] PROVE: Provable remote attestation for public verifiability

E Dushku, MM Rabbani, J Vliegen, A Braeken… - Journal of Information …, 2023 - Elsevier
The expanding attack surface of Internet of Things (IoT) systems calls for innovative security
approaches to verify the reliability of IoT devices. To this end, Remote Attestation (RA) …

Techniques for Enhancing Security in Industrial Control Systems

V Varadharajan, U Tupakula… - ACM Transactions on …, 2024 - dl.acm.org
Increasingly Industrial Control Systems (ICS) systems are being connected to the Internet to
minimise the operational costs and provide additional flexibility. These control systems such …

Vulnerability detection in cyber-physical system using machine learning

V Bharathi - Scalable Computing: Practice and Experience, 2024 - scpe.org
The cyber-physical system is a specific type of IoT communication environment that deals
with communication through innovative healthcare (medical) devices. The traditional …

[PDF][PDF] A Survey on Security Threats in the internet of medical things (IoMT)

W Toghuj, N Turab - J. Theor. Appl. Inf. Technol, 2022 - jatit.org
Recent developments in the Internet of Things (IoT) have led to the development of the
Internet of Medical Things (IoMT). Data collection, analysis, and transmission are key …

Raft: Hardware-assisted Dynamic Information Flow Tracking for Runtime Protection on RISC-V

Y Wang, J Wu, H Zheng, Z Ning, B He… - Proceedings of the 26th …, 2023 - dl.acm.org
Dynamic Information Flow Tracking (DIFT) is a fundamental computer security technique that
tracks the data flow of interest at runtime, overcoming the limitations of discovering data …

[PDF][PDF] IDA: Hybrid Attestation with Support for Interrupts and TOCTOU

F Arkannezhad, J Feng… - Network and Distributed …, 2024 - ndss-symposium.org
Remote attestation has received much attention recently due to the proliferation of
embedded and IoT devices. Among various solutions, methods based on hardware-software …

Teamwork Makes TEE Work: Open and Resilient Remote Attestation on Decentralized Trust

X Zhang, K Qin, S Qu, T Wang, C Zhang… - arXiv preprint arXiv …, 2024 - arxiv.org
Remote Attestation (RA) enables the integrity and authenticity of applications in Trusted
Execution Environment (TEE) to be verified. Existing TEE RA designs employ a centralized …