Static analysis of information systems for IoT cyber security: a survey of machine learning approaches
Ensuring security for modern IoT systems requires the use of complex methods to analyze
their software. One of the most in-demand methods that has repeatedly been proven to be …
their software. One of the most in-demand methods that has repeatedly been proven to be …
Electrical-level attacks on CPUs, FPGAs, and GPUs: Survey and implications in the heterogeneous era
Given the need for efficient high-performance computing, computer architectures combining
central processing units (CPUs), graphics processing units (GPUs), and field-programmable …
central processing units (CPUs), graphics processing units (GPUs), and field-programmable …
PLATYPUS: Software-based power side-channel attacks on x86
Power side-channel attacks exploit variations in power consumption to extract secrets from a
device, eg, cryptographic keys. Prior attacks typically required physical access to the target …
device, eg, cryptographic keys. Prior attacks typically required physical access to the target …
Machine learning benchmarking for secured iot smart systems
Smartness and IoT along with machine learning (ML) lead the research directions
nowadays. Smart city, smart campus, smart home, smart vehicle, etc; or if we call it “Smart x” …
nowadays. Smart city, smart campus, smart home, smart vehicle, etc; or if we call it “Smart x” …
Toward secured iot-based smart systems using machine learning
Machine learning (ML) and the internet of things (IoT) are among the most booming
research directions. Smart cities, smart campuses (SCs), smart homes, smart cars, early …
research directions. Smart cities, smart campuses (SCs), smart homes, smart cars, early …
Physical fault injection and side-channel attacks on mobile devices: A comprehensive analysis
Today's mobile devices contain densely packaged system-on-chips (SoCs) with multi-core,
high-frequency CPUs and complex pipelines. In parallel, sophisticated SoC-assisted …
high-frequency CPUs and complex pipelines. In parallel, sophisticated SoC-assisted …
Hierarchical classification for constrained IoT devices: A case study on human activity recognition
The massive number of Internet-of-Things (IoT) devices generates a hard-to-manage
volume of data. Cloud-centric processing approaches for the IoT data suffer from high and …
volume of data. Cloud-centric processing approaches for the IoT data suffer from high and …
[PDF][PDF] PQC-SEP: Power Side-channel Evaluation Platform for Post-Quantum Cryptography Algorithms.
Research in post-quantum cryptography (PQC) aims to develop cryptographic algorithms
that can withstand classical and quantum attacks. The recent advance in the PQC field has …
that can withstand classical and quantum attacks. The recent advance in the PQC field has …
Miracle: Micro-architectural leakage evaluation
In this paper, we describe an extensible experimental infrastructure and methodology for
evaluating the micro-architectural leakage, based on power consumption, which stems from …
evaluating the micro-architectural leakage, based on power consumption, which stems from …
Security of cloud FPGAs: A survey
Integrating Field Programmable Gate Arrays (FPGAs) with cloud computing instances is a
rapidly emerging trend on commercial cloud computing platforms such as Amazon Web …
rapidly emerging trend on commercial cloud computing platforms such as Amazon Web …