Semantics-based online malware detection: Towards efficient real-time protection against malware
Recently, malware has increasingly become a critical threat to embedded systems, while the
conventional software solutions, such as antivirus and patches, have not been so successful …
conventional software solutions, such as antivirus and patches, have not been so successful …
Microarchitectural side-channel threats, weaknesses and mitigations: a systematic mapping study
Over the course of recent years, microarchitectural side-channel attacks emerged as one of
the most novel and thought-provoking attacks to exfiltrate information from computing …
the most novel and thought-provoking attacks to exfiltrate information from computing …
Embedded Systems--A Security Paradigm for Pervasive Computing
S Sharma - 2013 International Conference on Communication …, 2013 - ieeexplore.ieee.org
The rapidly shrinking size of processor chips and memory, coupled with increasing speed
and processing elements, has enabled widespread usage of embedded systems running …
and processing elements, has enabled widespread usage of embedded systems running …
Securing embedded systems: Cyberattacks, countermeasures, and challenges
Embedded systems are continuously adopted in a wide range of application areas. These
systems are based on the use of low-energy-consumption microprocessors or …
systems are based on the use of low-energy-consumption microprocessors or …
Hardware-assisted online defense against malware and exploits
SK Das - 2016 - dr.ntu.edu.sg
Security is a major concern in the computing systems with the increasing number of cyber
attacks in recent years. Mainstream security solutions (eg, antivirus, scanners) are mostly …
attacks in recent years. Mainstream security solutions (eg, antivirus, scanners) are mostly …
Defense against microarchitecture side-channel attacks through runtime detection, isolation and prevention
A Javeed - 2022 - research.sabanciuniv.edu
Over the course of recent years, microarchitectural side-channel attacks emerged as one of
the most novel and thought-provoking attacks to exfiltrate information from a computing …
the most novel and thought-provoking attacks to exfiltrate information from a computing …
Securing access in embedded systems via DMA protection and light-weight cryptography.
FG Kolympianakis - 2021 - apothesis.lib.hmu.gr
Embedded systems are the driving force for technological development in many domains
such as automotive, healthcare and industrial control. Security is an important aspect of …
such as automotive, healthcare and industrial control. Security is an important aspect of …
[PDF][PDF] Dependable cyber-physical systems through control flow monitoring
J Van Der Woude - Undergraduate senior thesis, University of Illinois at …, 2013 - tcipg.org
Stuxnet, a virus found in Iranian nuclear facilities, proved the feasibility of an attack on an
industrial control system. Similar attacks on critical infrastructure such as the power grid or …
industrial control system. Similar attacks on critical infrastructure such as the power grid or …