Artificial intelligence in cyber security: research advances, challenges, and opportunities

Z Zhang, H Ning, F Shi, F Farha, Y Xu, J Xu… - Artificial Intelligence …, 2022 - Springer
In recent times, there have been attempts to leverage artificial intelligence (AI) techniques in
a broad range of cyber security applications. Therefore, this paper surveys the existing …

A survey of distributed denial-of-service attack, prevention, and mitigation techniques

T Mahjabin, Y Xiao, G Sun… - International Journal of …, 2017 - journals.sagepub.com
Distributed denial-of-service is one kind of the most highlighted and most important attacks
of today's cyberworld. With simple but extremely powerful attack mechanisms, it introduces …

Sok: The challenges, pitfalls, and perils of using hardware performance counters for security

S Das, J Werner, M Antonakakis… - … IEEE Symposium on …, 2019 - ieeexplore.ieee.org
Hardware Performance Counters (HPCs) have been available in processors for more than a
decade. These counters can be used to monitor and measure events that occur at the CPU …

Future cloud systems design: challenges and research directions

A Taherkordi, F Zahid, Y Verginadis, G Horn - IEEE Access, 2018 - ieeexplore.ieee.org
Cloud computing has been recognized as the de facto utility computing standard for hosting
and delivering services over the Internet. Cloud platforms are being rapidly adopted by …

Anomaly detection in real-time multi-threaded processes using hardware performance counters

P Krishnamurthy, R Karri… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
We propose a novel methodology for real-time monitoring of software running on embedded
processors in cyber-physical systems (CPS). The approach uses real-time monitoring of …

A theoretical study of hardware performance counters-based malware detection

K Basu, P Krishnamurthy, F Khorrami… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Malware can range from simple adware to stealthy kernel control-flow modifying rootkits.
Although anti-virus software is popular, an ongoing cat-and-mouse cycle of anti-virus …

Analyzing the efficiency of machine learning classifiers in hardware-based malware detectors

AP Kuruvila, S Kundu, K Basu - 2020 IEEE Computer Society …, 2020 - ieeexplore.ieee.org
The emergence of promising Internet-of-things (IoT) empowered Consumer Electronic
devices resulted in their exhaustive proliferation across several safety-critical architectures …

Malicious firmware detection with hardware performance counters

X Wang, C Konstantinou, M Maniatakos… - … on Multi-Scale …, 2016 - ieeexplore.ieee.org
Critical infrastructure components nowadays use microprocessor-based embedded control
systems. It is often infeasible, however, to employ the same level of security measures used …

Remote non-intrusive malware detection for plcs based on chain of trust rooted in hardware

PHN Rajput, E Sarkar, D Tychalas… - 2021 IEEE European …, 2021 - ieeexplore.ieee.org
Digitization has been rapidly integrated with manufacturing industries and critical
infrastructure to increase efficiency, productivity, and reduce wastefulness, a transition being …

Hardware trojan detection using changepoint-based anomaly detection techniques

R Elnaggar, K Chakrabarty… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
There has been a growing trend in recent years to outsource various aspects of the
semiconductor design and manufacturing flow to different parties spread across the globe …