Formal methods and validation techniques for ensuring automotive systems security

M Krichen - Information, 2023 - mdpi.com
The increasing complexity and connectivity of automotive systems have raised concerns
about their vulnerability to security breaches. As a result, the integration of formal methods …

A comprehensive survey on hardware-assisted malware analysis and primitive techniques

EP Kumar, S Priyanka - Computer Networks, 2023 - Elsevier
Malware poses an extremely dangerous threat to the digital world, significantly impacting
various domains such as smart cities, intelligent transportation, wireless sensor networks …

[HTML][HTML] A Novel Approach of a Low-Cost Voltage Fault Injection Method for Resource-Constrained IoT Devices: Design and Analysis

N Ruminot, C Estevez, S Montejo-Sánchez - Sensors, 2023 - mdpi.com
The rapid development of the Internet of Things (IoT) has brought about the processing and
storage of sensitive information on resource-constrained devices, which are susceptible to …

[PDF][PDF] Adversarial Reachability for Program-level Security Analysis.

S Ducousso, S Bardin, ML Potet - ESOP, 2023 - library.oapen.org
Many program analysis tools and techniques have been developed to assess program
vulnerability. Yet, they are based on the standard concept of reachability and represent an …

Combining static analysis and dynamic symbolic execution in a toolchain to detect fault injection vulnerabilities

G Lacombe, D Feliot, E Boespflug, ML Potet - Journal of Cryptographic …, 2024 - Springer
Certification through auditing allows to ensure that critical embedded systems are secure.
This entails reviewing their critical components and checking for dangerous execution paths …

Role-Driven Clustering of Stakeholders: A Study of IoT Security Improvement

L Almalki, A Alnahdi, T Albalawi - Sensors, 2023 - mdpi.com
This study aims to address the challenges of managing the vast amount of data generated
by Internet of Things (IoT) devices by categorizing stakeholders based on their roles in IoT …

Power-Based Side-Channel Attacks on Program Control Flow with Machine Learning Models

A Robins, S Olguin, J Brown, C Carper… - Journal of Cybersecurity …, 2023 - mdpi.com
The control flow of a program represents valuable and sensitive information; in embedded
systems, this information can take on even greater value as the resources, control flow, and …

A Framework for Synthetic Agetech Attack Data Generation

N Khaemba, I Traoré, M Mamun - Journal of Cybersecurity and Privacy, 2023 - mdpi.com
To address the lack of datasets for agetech, this paper presents an approach for generating
synthetic datasets that include traces of benign and attack datasets for agetech. The …

Silicon Proven 1.29 μm× 1.8 μm 65nm Sub-Vt Optical Sensor for Hardware Security Applications

D Zooker, Y Weizman, A Fish, O Keren - IEEE Access, 2023 - ieeexplore.ieee.org
Optical fault injection is a type of attack vector targeting cryptographic circuits where the
adversary injects faults during system operation to bypass defenses or reveal secret …

Blockchain-Based Runtime Attestation Against Physical Fault Injection Attacks on Edge Devices

C Cao, J Wu, H Qi, S Eda - 2023 IEEE/ACM Symposium on …, 2023 - ieeexplore.ieee.org
With the ever-increasing proliferation of edge devices for applications, such as home
automation and vehicle systems, their security vulnerabilities have received additional …