Remote non-intrusive malware detection for plcs based on chain of trust rooted in hardware
Digitization has been rapidly integrated with manufacturing industries and critical
infrastructure to increase efficiency, productivity, and reduce wastefulness, a transition being …
infrastructure to increase efficiency, productivity, and reduce wastefulness, a transition being …
Hardware-assisted malware detection using machine learning
Z Pan, J Sheldon, C Sudusinghe… - … , Automation & Test …, 2021 - ieeexplore.ieee.org
Malicious software, popularly known as malware, is a serious threat to modern computing
systems. A comprehensive cybercrime study by Ponemon Institute highlights that malware is …
systems. A comprehensive cybercrime study by Ponemon Institute highlights that malware is …
Two sides of the same coin: Boons and banes of machine learning in hardware security
The last decade has witnessed remarkable research advances at the intersection of
machine learning (ML) and hardware security. The confluence of the two technologies has …
machine learning (ML) and hardware security. The confluence of the two technologies has …
Ml-based ddos detection and identification using native cloud telemetry macroscopic monitoring
The detection and identification of Distributed Denial-of-Service (DDoS) attacks remains a
challenge in cloud/edge/fog computing environments. It usually requires network …
challenge in cloud/edge/fog computing environments. It usually requires network …
Time series-based malware detection using hardware performance counters
With the advent of Internet-of-Things (IoT), Malware has been exponentially proliferating
across a plethora of platforms including PC, mobile, and other embedded devices. Software …
across a plethora of platforms including PC, mobile, and other embedded devices. Software …
Detection and Prevention from DDoS Attack Using Software-Defined Security
The network which is able to accommodate today's real-time need is growing in a very fast
manner. But simultaneously also occurs an increase in the rate of network attacks and …
manner. But simultaneously also occurs an increase in the rate of network attacks and …
Hardware performance counters: Ready-made vs tailor-made
Micro-architectural footprints can be used to distinguish one application from another. Most
modern processors feature hardware performance counters to monitor the various micro …
modern processors feature hardware performance counters to monitor the various micro …
Securing an accelerator-rich system from flooding-based denial-of-service attacks
Increasing demand for high performance and energy efficiency along with time-to-market
pressures have led to a growing number of third-party accelerators in modern System-on …
pressures have led to a growing number of third-party accelerators in modern System-on …
Cyber resilience for self-monitoring IOT devices
Modern embedded IoT devices are an attractive target for cyber attacks. For example, they
can be used to disable entire factories and ask for ransom. Recovery of compromised …
can be used to disable entire factories and ask for ransom. Recovery of compromised …
Prediction, detection, and mitigation of DDOS attacks using hpcs: Design for a safer adaptive infrastructure
PP Do Nascimento, IFAF Colares, R Maciel… - … of Research on Cyber …, 2021 - igi-global.com
Web service interruptions caused by DDoS (distributed denial of service) attacks have
increased considerably over the years, and intrusion detection systems (IDS) are not …
increased considerably over the years, and intrusion detection systems (IDS) are not …