Survey of automotive controller area network intrusion detection systems

C Young, J Zambreno, H Olufowobi… - IEEE Design & …, 2019 - ieeexplore.ieee.org
Editor's note: Control Area Network (CAN) is one of the most popular targets for malicious
attacks and exploitations in modern automotive systems. The goal of intrusion detection …

Multi-attribute decision-making for intrusion detection systems: A systematic review

A Alamleh, OS Albahri, AA Zaidan… - … Journal of Information …, 2023 - World Scientific
Intrusion detection systems (IDSs) employ sophisticated security techniques to detect
malicious activities on hosts and/or networks. IDSs have been utilized to ensure the security …

Detecting attacks against robotic vehicles: A control invariant approach

H Choi, WC Lee, Y Aafer, F Fei, Z Tu, X Zhang… - Proceedings of the …, 2018 - dl.acm.org
Robotic vehicles (RVs), such as drones and ground rovers, are a type of cyber-physical
systems that operate in the physical world under the control of computing components in the …

Orpheus: Enforcing cyber-physical execution semantics to defend against data-oriented attacks

L Cheng, K Tian, D Yao - Proceedings of the 33rd Annual Computer …, 2017 - dl.acm.org
Recent studies have revealed that control programs running on embedded devices suffer
from both control-oriented attacks (eg, code-injection or code-reuse attacks) and data …

Intelligent intrusion detection in low-power IoTs

A Saeed, A Ahmadinia, A Javed, H Larijani - ACM Transactions on …, 2016 - dl.acm.org
Security and privacy of data are one of the prime concerns in today's Internet of Things (IoT).
Conventional security techniques like signature-based detection of malware and regular …

Fast nearest neighbor search in high-dimensional space

S Berchtold, B Ertl, DA Keim… - … Conference on Data …, 1998 - ieeexplore.ieee.org
Similarity search in multimedia databases requires an efficient support of nearest neighbor
search on a large set of high dimensional points as a basic operation for query processing …

Realswatt: Remote software-based attestation for embedded devices under realtime constraints

S Surminski, C Niesler, F Brasser, L Davi… - Proceedings of the …, 2021 - dl.acm.org
Smart factories, critical infrastructures, and medical devices largely rely on embedded
systems that need to satisfy realtime constraints to complete crucial tasks. Recent studies …

Taskshuffler: A schedule randomization protocol for obfuscation against timing inference attacks in real-time systems

MK Yoon, S Mohan, CY Chen… - 2016 IEEE Real-Time and …, 2016 - ieeexplore.ieee.org
The high degree of predictability in real-time systems makes it possible for adversaries to
launch timing inference attacks such as those based on side-channels and covert-channels …

Runtime detection of a bandwidth denial attack from a rogue network-on-chip

R JS, DM Ancajas, K Chakraborty, S Roy - Proceedings of the 9th …, 2015 - dl.acm.org
In this paper, we propose a covert threat model for MPSoCs designed using 3rd party
Network-on-Chips (NoC). We illustrate that a malicious NoC can disrupt the availability of on …

Real-time adaptive sensor attack detection in autonomous cyber-physical systems

F Akowuah, F Kong - 2021 IEEE 27th real-time and embedded …, 2021 - ieeexplore.ieee.org
Cyber-Physical Systems (CPS) tightly couple information technology with physical
processes, which rises new vulnerabilities such as physical attacks that are beyond …