Remote non-intrusive malware detection for plcs based on chain of trust rooted in hardware

PHN Rajput, E Sarkar, D Tychalas… - 2021 IEEE European …, 2021 - ieeexplore.ieee.org
Digitization has been rapidly integrated with manufacturing industries and critical
infrastructure to increase efficiency, productivity, and reduce wastefulness, a transition being …

Hardware-assisted malware detection using machine learning

Z Pan, J Sheldon, C Sudusinghe… - … , Automation & Test …, 2021 - ieeexplore.ieee.org
Malicious software, popularly known as malware, is a serious threat to modern computing
systems. A comprehensive cybercrime study by Ponemon Institute highlights that malware is …

Two sides of the same coin: Boons and banes of machine learning in hardware security

W Liu, CH Chang, X Wang, C Liu… - IEEE Journal on …, 2021 - ieeexplore.ieee.org
The last decade has witnessed remarkable research advances at the intersection of
machine learning (ML) and hardware security. The confluence of the two technologies has …

Ml-based ddos detection and identification using native cloud telemetry macroscopic monitoring

JH Corrêa, PM Ciarelli, MRN Ribeiro… - Journal of Network and …, 2021 - Springer
The detection and identification of Distributed Denial-of-Service (DDoS) attacks remains a
challenge in cloud/edge/fog computing environments. It usually requires network …

Time series-based malware detection using hardware performance counters

AP Kuruvila, S Karmakar, K Basu - 2021 IEEE International …, 2021 - ieeexplore.ieee.org
With the advent of Internet-of-Things (IoT), Malware has been exponentially proliferating
across a plethora of platforms including PC, mobile, and other embedded devices. Software …

Detection and Prevention from DDoS Attack Using Software-Defined Security

S Badotra, SN Panda, P Datta - … : Proceedings of ICACIE 2019, Volume 1, 2021 - Springer
The network which is able to accommodate today's real-time need is growing in a very fast
manner. But simultaneously also occurs an increase in the rate of network attacks and …

Hardware performance counters: Ready-made vs tailor-made

AP Kuruvila, A Mahapatra, R Karri, K Basu - ACM Transactions on …, 2021 - dl.acm.org
Micro-architectural footprints can be used to distinguish one application from another. Most
modern processors feature hardware performance counters to monitor the various micro …

Securing an accelerator-rich system from flooding-based denial-of-service attacks

M Sinha, P Bhattacharyya, SS Rout… - … on Emerging Topics …, 2021 - ieeexplore.ieee.org
Increasing demand for high performance and energy efficiency along with time-to-market
pressures have led to a growing number of third-party accelerators in modern System-on …

Cyber resilience for self-monitoring IOT devices

M Medwed, V Nikov, J Renes… - … on Cyber Security …, 2021 - ieeexplore.ieee.org
Modern embedded IoT devices are an attractive target for cyber attacks. For example, they
can be used to disable entire factories and ask for ransom. Recovery of compromised …

Prediction, detection, and mitigation of DDOS attacks using hpcs: Design for a safer adaptive infrastructure

PP Do Nascimento, IFAF Colares, R Maciel… - … of Research on Cyber …, 2021 - igi-global.com
Web service interruptions caused by DDoS (distributed denial of service) attacks have
increased considerably over the years, and intrusion detection systems (IDS) are not …