Machine learning for intrusion detection in industrial control systems: Applications, challenges, and recommendations

MA Umer, KN Junejo, MT Jilani, AP Mathur - International Journal of …, 2022 - Elsevier
Methods from machine learning are used in the design of secure Industrial Control Systems.
Such methods focus on two major areas: detection of intrusions at the network level using …

Sok: The challenges, pitfalls, and perils of using hardware performance counters for security

S Das, J Werner, M Antonakakis… - … IEEE Symposium on …, 2019 - ieeexplore.ieee.org
Hardware Performance Counters (HPCs) have been available in processors for more than a
decade. These counters can be used to monitor and measure events that occur at the CPU …

A comprehensive study of security and privacy guidelines, threats, and countermeasures: An IoT perspective

HA Abdul-Ghani, D Konstantas - Journal of Sensor and Actuator …, 2019 - mdpi.com
As Internet of Things (IoT) involvement increases in our daily lives, several security and
privacy concerns like linkability, unauthorized conversations, and side-channel attacks are …

Hardware-assisted detection of firmware attacks in inverter-based cyberphysical microgrids

AP Kuruvila, I Zografopoulos, K Basu… - International Journal of …, 2021 - Elsevier
The electric grid modernization effort relies on the extensive deployment of microgrid (MG)
systems. MGs integrate renewable resources and energy storage systems, allowing to …

Anomaly detection in real-time multi-threaded processes using hardware performance counters

P Krishnamurthy, R Karri… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
We propose a novel methodology for real-time monitoring of software running on embedded
processors in cyber-physical systems (CPS). The approach uses real-time monitoring of …

A theoretical study of hardware performance counters-based malware detection

K Basu, P Krishnamurthy, F Khorrami… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Malware can range from simple adware to stealthy kernel control-flow modifying rootkits.
Although anti-virus software is popular, an ongoing cat-and-mouse cycle of anti-virus …

Operational and economy-wide impacts of compound cyber-attacks and extreme weather events on electric power networks

C Avraam, L Ceferino, Y Dvorkin - Applied Energy, 2023 - Elsevier
The growing frequencies of extreme weather events and cyber-attacks give rise to a novel
threat where a malicious cyber actor aims to disrupt stressed components of critical …

[HTML][HTML] Time series-based detection and impact analysis of firmware attacks in microgrids

I Zografopoulos, AP Kuruvila, K Basu, C Konstantinou - Energy Reports, 2022 - Elsevier
Distributed generation (DG) and microgrids (MG) are critical components of future power
systems. However, the reliance of DGs and MG on resource-constrained embedded …

Leveraging side-channel information for disassembly and security

J Park, F Rahman, A Vassilev, D Forte… - ACM Journal on …, 2019 - dl.acm.org
With the rise of Internet of Things (IoT), devices such as smartphones, embedded medical
devices, smart home appliances, as well as traditional computing platforms such as …

Hardware-layer intelligence collection for smart grid embedded systems

C Konstantinou, M Maniatakos - Journal of Hardware and Systems …, 2019 - Springer
Smart grids include a variety of microprocessor-based embedded systems, interconnected
with communication technologies. In this interaction, hardware is the lower level of …