Artificial intelligence in cyber security: research advances, challenges, and opportunities
In recent times, there have been attempts to leverage artificial intelligence (AI) techniques in
a broad range of cyber security applications. Therefore, this paper surveys the existing …
a broad range of cyber security applications. Therefore, this paper surveys the existing …
A survey of distributed denial-of-service attack, prevention, and mitigation techniques
T Mahjabin, Y Xiao, G Sun… - International Journal of …, 2017 - journals.sagepub.com
Distributed denial-of-service is one kind of the most highlighted and most important attacks
of today's cyberworld. With simple but extremely powerful attack mechanisms, it introduces …
of today's cyberworld. With simple but extremely powerful attack mechanisms, it introduces …
Sok: The challenges, pitfalls, and perils of using hardware performance counters for security
Hardware Performance Counters (HPCs) have been available in processors for more than a
decade. These counters can be used to monitor and measure events that occur at the CPU …
decade. These counters can be used to monitor and measure events that occur at the CPU …
Future cloud systems design: challenges and research directions
Cloud computing has been recognized as the de facto utility computing standard for hosting
and delivering services over the Internet. Cloud platforms are being rapidly adopted by …
and delivering services over the Internet. Cloud platforms are being rapidly adopted by …
Anomaly detection in real-time multi-threaded processes using hardware performance counters
P Krishnamurthy, R Karri… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
We propose a novel methodology for real-time monitoring of software running on embedded
processors in cyber-physical systems (CPS). The approach uses real-time monitoring of …
processors in cyber-physical systems (CPS). The approach uses real-time monitoring of …
A theoretical study of hardware performance counters-based malware detection
Malware can range from simple adware to stealthy kernel control-flow modifying rootkits.
Although anti-virus software is popular, an ongoing cat-and-mouse cycle of anti-virus …
Although anti-virus software is popular, an ongoing cat-and-mouse cycle of anti-virus …
Analyzing the efficiency of machine learning classifiers in hardware-based malware detectors
The emergence of promising Internet-of-things (IoT) empowered Consumer Electronic
devices resulted in their exhaustive proliferation across several safety-critical architectures …
devices resulted in their exhaustive proliferation across several safety-critical architectures …
Malicious firmware detection with hardware performance counters
Critical infrastructure components nowadays use microprocessor-based embedded control
systems. It is often infeasible, however, to employ the same level of security measures used …
systems. It is often infeasible, however, to employ the same level of security measures used …
Remote non-intrusive malware detection for plcs based on chain of trust rooted in hardware
Digitization has been rapidly integrated with manufacturing industries and critical
infrastructure to increase efficiency, productivity, and reduce wastefulness, a transition being …
infrastructure to increase efficiency, productivity, and reduce wastefulness, a transition being …
Hardware trojan detection using changepoint-based anomaly detection techniques
R Elnaggar, K Chakrabarty… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
There has been a growing trend in recent years to outsource various aspects of the
semiconductor design and manufacturing flow to different parties spread across the globe …
semiconductor design and manufacturing flow to different parties spread across the globe …