Semantics-based online malware detection: Towards efficient real-time protection against malware

S Das, Y Liu, W Zhang… - IEEE transactions on …, 2015 - ieeexplore.ieee.org
Recently, malware has increasingly become a critical threat to embedded systems, while the
conventional software solutions, such as antivirus and patches, have not been so successful …

Microarchitectural side-channel threats, weaknesses and mitigations: a systematic mapping study

A Javeed, C Yilmaz, E Savas - IEEE Access, 2023 - ieeexplore.ieee.org
Over the course of recent years, microarchitectural side-channel attacks emerged as one of
the most novel and thought-provoking attacks to exfiltrate information from computing …

Embedded Systems--A Security Paradigm for Pervasive Computing

S Sharma - 2013 International Conference on Communication …, 2013 - ieeexplore.ieee.org
The rapidly shrinking size of processor chips and memory, coupled with increasing speed
and processing elements, has enabled widespread usage of embedded systems running …

[PDF][PDF] 安全处理器研究进展

赵剑锋, 史岗 - 信息安全学报, 2018 - jcs.iie.ac.cn
摘要信息安全已经影响到一个国家的政治, 军事, 经济和文化等诸多领域. 信息一般在计算机系统
上存储和处理. 计算机系统的核心器件是处理器, 所以处理器的安全是计算机系统安全的基础 …

Securing embedded systems: Cyberattacks, countermeasures, and challenges

MA Ferrag, N Chekkai, M Nafa - Securing Cyber-Physical …, 2015 - api.taylorfrancis.com
Embedded systems are continuously adopted in a wide range of application areas. These
systems are based on the use of low-energy-consumption microprocessors or …

Hardware-assisted online defense against malware and exploits

SK Das - 2016 - dr.ntu.edu.sg
Security is a major concern in the computing systems with the increasing number of cyber
attacks in recent years. Mainstream security solutions (eg, antivirus, scanners) are mostly …

Defense against microarchitecture side-channel attacks through runtime detection, isolation and prevention

A Javeed - 2022 - research.sabanciuniv.edu
Over the course of recent years, microarchitectural side-channel attacks emerged as one of
the most novel and thought-provoking attacks to exfiltrate information from a computing …

Securing access in embedded systems via DMA protection and light-weight cryptography.

FG Kolympianakis - 2021 - apothesis.lib.hmu.gr
Embedded systems are the driving force for technological development in many domains
such as automotive, healthcare and industrial control. Security is an important aspect of …

[PDF][PDF] Dependable cyber-physical systems through control flow monitoring

J Van Der Woude - Undergraduate senior thesis, University of Illinois at …, 2013 - tcipg.org
Stuxnet, a virus found in Iranian nuclear facilities, proved the feasibility of an attack on an
industrial control system. Similar attacks on critical infrastructure such as the power grid or …