Machine learning for intrusion detection in industrial control systems: Applications, challenges, and recommendations
Methods from machine learning are used in the design of secure Industrial Control Systems.
Such methods focus on two major areas: detection of intrusions at the network level using …
Such methods focus on two major areas: detection of intrusions at the network level using …
Sok: The challenges, pitfalls, and perils of using hardware performance counters for security
Hardware Performance Counters (HPCs) have been available in processors for more than a
decade. These counters can be used to monitor and measure events that occur at the CPU …
decade. These counters can be used to monitor and measure events that occur at the CPU …
A comprehensive study of security and privacy guidelines, threats, and countermeasures: An IoT perspective
HA Abdul-Ghani, D Konstantas - Journal of Sensor and Actuator …, 2019 - mdpi.com
As Internet of Things (IoT) involvement increases in our daily lives, several security and
privacy concerns like linkability, unauthorized conversations, and side-channel attacks are …
privacy concerns like linkability, unauthorized conversations, and side-channel attacks are …
Hardware-assisted detection of firmware attacks in inverter-based cyberphysical microgrids
The electric grid modernization effort relies on the extensive deployment of microgrid (MG)
systems. MGs integrate renewable resources and energy storage systems, allowing to …
systems. MGs integrate renewable resources and energy storage systems, allowing to …
Anomaly detection in real-time multi-threaded processes using hardware performance counters
P Krishnamurthy, R Karri… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
We propose a novel methodology for real-time monitoring of software running on embedded
processors in cyber-physical systems (CPS). The approach uses real-time monitoring of …
processors in cyber-physical systems (CPS). The approach uses real-time monitoring of …
A theoretical study of hardware performance counters-based malware detection
Malware can range from simple adware to stealthy kernel control-flow modifying rootkits.
Although anti-virus software is popular, an ongoing cat-and-mouse cycle of anti-virus …
Although anti-virus software is popular, an ongoing cat-and-mouse cycle of anti-virus …
Operational and economy-wide impacts of compound cyber-attacks and extreme weather events on electric power networks
The growing frequencies of extreme weather events and cyber-attacks give rise to a novel
threat where a malicious cyber actor aims to disrupt stressed components of critical …
threat where a malicious cyber actor aims to disrupt stressed components of critical …
[HTML][HTML] Time series-based detection and impact analysis of firmware attacks in microgrids
Distributed generation (DG) and microgrids (MG) are critical components of future power
systems. However, the reliance of DGs and MG on resource-constrained embedded …
systems. However, the reliance of DGs and MG on resource-constrained embedded …
Leveraging side-channel information for disassembly and security
With the rise of Internet of Things (IoT), devices such as smartphones, embedded medical
devices, smart home appliances, as well as traditional computing platforms such as …
devices, smart home appliances, as well as traditional computing platforms such as …
Hardware-layer intelligence collection for smart grid embedded systems
C Konstantinou, M Maniatakos - Journal of Hardware and Systems …, 2019 - Springer
Smart grids include a variety of microprocessor-based embedded systems, interconnected
with communication technologies. In this interaction, hardware is the lower level of …
with communication technologies. In this interaction, hardware is the lower level of …