Survey of automotive controller area network intrusion detection systems
C Young, J Zambreno, H Olufowobi… - IEEE Design & …, 2019 - ieeexplore.ieee.org
Editor's note: Control Area Network (CAN) is one of the most popular targets for malicious
attacks and exploitations in modern automotive systems. The goal of intrusion detection …
attacks and exploitations in modern automotive systems. The goal of intrusion detection …
Multi-attribute decision-making for intrusion detection systems: A systematic review
Intrusion detection systems (IDSs) employ sophisticated security techniques to detect
malicious activities on hosts and/or networks. IDSs have been utilized to ensure the security …
malicious activities on hosts and/or networks. IDSs have been utilized to ensure the security …
Detecting attacks against robotic vehicles: A control invariant approach
Robotic vehicles (RVs), such as drones and ground rovers, are a type of cyber-physical
systems that operate in the physical world under the control of computing components in the …
systems that operate in the physical world under the control of computing components in the …
Orpheus: Enforcing cyber-physical execution semantics to defend against data-oriented attacks
Recent studies have revealed that control programs running on embedded devices suffer
from both control-oriented attacks (eg, code-injection or code-reuse attacks) and data …
from both control-oriented attacks (eg, code-injection or code-reuse attacks) and data …
Intelligent intrusion detection in low-power IoTs
Security and privacy of data are one of the prime concerns in today's Internet of Things (IoT).
Conventional security techniques like signature-based detection of malware and regular …
Conventional security techniques like signature-based detection of malware and regular …
Fast nearest neighbor search in high-dimensional space
S Berchtold, B Ertl, DA Keim… - … Conference on Data …, 1998 - ieeexplore.ieee.org
Similarity search in multimedia databases requires an efficient support of nearest neighbor
search on a large set of high dimensional points as a basic operation for query processing …
search on a large set of high dimensional points as a basic operation for query processing …
Realswatt: Remote software-based attestation for embedded devices under realtime constraints
Smart factories, critical infrastructures, and medical devices largely rely on embedded
systems that need to satisfy realtime constraints to complete crucial tasks. Recent studies …
systems that need to satisfy realtime constraints to complete crucial tasks. Recent studies …
Taskshuffler: A schedule randomization protocol for obfuscation against timing inference attacks in real-time systems
The high degree of predictability in real-time systems makes it possible for adversaries to
launch timing inference attacks such as those based on side-channels and covert-channels …
launch timing inference attacks such as those based on side-channels and covert-channels …
Runtime detection of a bandwidth denial attack from a rogue network-on-chip
In this paper, we propose a covert threat model for MPSoCs designed using 3rd party
Network-on-Chips (NoC). We illustrate that a malicious NoC can disrupt the availability of on …
Network-on-Chips (NoC). We illustrate that a malicious NoC can disrupt the availability of on …
Real-time adaptive sensor attack detection in autonomous cyber-physical systems
Cyber-Physical Systems (CPS) tightly couple information technology with physical
processes, which rises new vulnerabilities such as physical attacks that are beyond …
processes, which rises new vulnerabilities such as physical attacks that are beyond …