Static analysis of information systems for IoT cyber security: a survey of machine learning approaches

I Kotenko, K Izrailov, M Buinevich - Sensors, 2022 - mdpi.com
Ensuring security for modern IoT systems requires the use of complex methods to analyze
their software. One of the most in-demand methods that has repeatedly been proven to be …

Electrical-level attacks on CPUs, FPGAs, and GPUs: Survey and implications in the heterogeneous era

DG Mahmoud, V Lenders, M Stojilović - ACM Computing Surveys (CSUR …, 2022 - dl.acm.org
Given the need for efficient high-performance computing, computer architectures combining
central processing units (CPUs), graphics processing units (GPUs), and field-programmable …

PLATYPUS: Software-based power side-channel attacks on x86

M Lipp, A Kogler, D Oswald, M Schwarz… - … IEEE Symposium on …, 2021 - ieeexplore.ieee.org
Power side-channel attacks exploit variations in power consumption to extract secrets from a
device, eg, cryptographic keys. Prior attacks typically required physical access to the target …

Machine learning benchmarking for secured iot smart systems

MS Abdalzaher, MM Salim, HA Elsayed… - … on Internet of Things …, 2022 - ieeexplore.ieee.org
Smartness and IoT along with machine learning (ML) lead the research directions
nowadays. Smart city, smart campus, smart home, smart vehicle, etc; or if we call it “Smart x” …

Toward secured iot-based smart systems using machine learning

MS Abdalzaher, MM Fouda, HA Elsayed… - IEEE access, 2023 - ieeexplore.ieee.org
Machine learning (ML) and the internet of things (IoT) are among the most booming
research directions. Smart cities, smart campuses (SCs), smart homes, smart cars, early …

Physical fault injection and side-channel attacks on mobile devices: A comprehensive analysis

C Shepherd, K Markantonakis, N Van Heijningen… - Computers & …, 2021 - Elsevier
Today's mobile devices contain densely packaged system-on-chips (SoCs) with multi-core,
high-frequency CPUs and complex pipelines. In parallel, sophisticated SoC-assisted …

Hierarchical classification for constrained IoT devices: A case study on human activity recognition

F Samie, L Bauer, J Henkel - IEEE Internet of Things Journal, 2020 - ieeexplore.ieee.org
The massive number of Internet-of-Things (IoT) devices generates a hard-to-manage
volume of data. Cloud-centric processing approaches for the IoT data suffer from high and …

[PDF][PDF] PQC-SEP: Power Side-channel Evaluation Platform for Post-Quantum Cryptography Algorithms.

J Park, NN Anandakumar, D Saha… - IACR Cryptol. ePrint …, 2022 - researchgate.net
Research in post-quantum cryptography (PQC) aims to develop cryptographic algorithms
that can withstand classical and quantum attacks. The recent advance in the PQC field has …

Miracle: Micro-architectural leakage evaluation

B Marshall, D Page, J Webb - Cryptology ePrint Archive, 2021 - eprint.iacr.org
In this paper, we describe an extensible experimental infrastructure and methodology for
evaluating the micro-architectural leakage, based on power consumption, which stems from …

Security of cloud FPGAs: A survey

C **, V Gohil, R Karri, J Rajendran - arxiv preprint arxiv:2005.04867, 2020 - arxiv.org
Integrating Field Programmable Gate Arrays (FPGAs) with cloud computing instances is a
rapidly emerging trend on commercial cloud computing platforms such as Amazon Web …