The cybersecurity landscape in industrial control systems

S McLaughlin, C Konstantinou, X Wang… - Proceedings of the …, 2016 - ieeexplore.ieee.org
Industrial control systems (ICSs) are transitioning from legacy-electromechanical-based
systems to modern information and communication technology (ICT)-based systems …

The lazarus effect: Healing compromised devices in the internet of small things

M Huber, S Hristozov, S Ott, V Sarafov… - Proceedings of the 15th …, 2020 - dl.acm.org
We live in a time when billions of IoT devices are being deployed and increasingly relied
upon. This makes ensuring their availability and recoverability in case of a compromise a …

Verify&revive: Secure detection and recovery of compromised low-end embedded devices

M Ammar, B Crispo - Proceedings of the 36th Annual Computer Security …, 2020 - dl.acm.org
Tiny and specialized computing platforms, so-called embedded or Internet of Things (IoT)
devices, are increasingly used in safety-and privacy-critical application scenarios. A …

A comprehensive black-box methodology for testing the forensic characteristics of solid-state drives

G Bonetti, M Viglione, A Frossi, F Maggi… - Proceedings of the 29th …, 2013 - dl.acm.org
Solid-state drives (SSDs) are inherently different from traditional drives, as they incorporate
data-optimization mechanisms to overcome their limitations (such as a limited number of …

A checkpoint compression study for high-performance computing systems

D Ibtesham, KB Ferreira… - The International Journal …, 2015 - journals.sagepub.com
As high-performance computing systems continue to increase in size and complexity, higher
failure rates and increased overheads for checkpoint/restart (CR) protocols have raised …

Apps can quickly destroy your mobile's flash: why they don't, and how to keep it that way

T Zhang, A Zuck, DE Porter, D Tsafrir - Proceedings of the 17th Annual …, 2019 - dl.acm.org
Although flash cells wear out, a typical SSD has enough cells and sufficiently sophisticated
firmware that its lifetime generally exceeds the expected lifetime of its host system. Even …

Harzer roller: Linker-based instrumentation for enhanced embedded security testing

K Bogad, M Huber - Proceedings of the 3rd Reversing and Offensive …, 2019 - dl.acm.org
Due to the rise of the Internet of Things, there are many new chips and platforms available
for hobbyists and industry alike to build smart devices. The SDKs for these new platforms …

Black-box forensic and antiforensic characteristics of solid-state drives

G Bonetti, M Viglione, A Frossi, F Maggi… - Journal of Computer …, 2014 - Springer
Solid-state drives (SSDs) are inherently different from traditional drives, as they incorporate
data-optimization mechanisms to overcome their limitations (such as a limited number of …

SSD forensic investigation using open source tool

H Suthar, P Sharma - Examining Multimedia Forensics and Content …, 2023 - igi-global.com
According to the CIA triad, Cyber Forensic Investigation judicial point of view is the data
integrity of volatile memory kinds of data storage devices. This has long been a source of …

[PDF][PDF] The industrial control systems cyber security landscape

S McLaughlin, C Konstantinou, X Wang… - Proceedings of the …, 2016 - researchgate.net
Industrial Control Systems (ICS) are transitioning from legacy electromechanical based
systems to modern information and communication technology (ICT) based systems creating …