[HTML][HTML] Static analysis of information systems for IoT cyber security: A survey of machine learning approaches

I Kotenko, K Izrailov, M Buinevich - Sensors, 2022 - mdpi.com
Ensuring security for modern IoT systems requires the use of complex methods to analyze
their software. One of the most in-demand methods that has repeatedly been proven to be …

Electrical-level attacks on CPUs, FPGAs, and GPUs: Survey and implications in the heterogeneous era

DG Mahmoud, V Lenders, M Stojilović - ACM Computing Surveys (CSUR …, 2022 - dl.acm.org
Given the need for efficient high-performance computing, computer architectures combining
central processing units (CPUs), graphics processing units (GPUs), and field-programmable …

PLATYPUS: Software-based power side-channel attacks on x86

M Lipp, A Kogler, D Oswald, M Schwarz… - … IEEE Symposium on …, 2021 - ieeexplore.ieee.org
Power side-channel attacks exploit variations in power consumption to extract secrets from a
device, eg, cryptographic keys. Prior attacks typically required physical access to the target …

Toward secured iot-based smart systems using machine learning

MS Abdalzaher, MM Fouda, HA Elsayed… - IEEE access, 2023 - ieeexplore.ieee.org
Machine learning (ML) and the internet of things (IoT) are among the most booming
research directions. Smart cities, smart campuses (SCs), smart homes, smart cars, early …

Physical fault injection and side-channel attacks on mobile devices: A comprehensive analysis

C Shepherd, K Markantonakis, N Van Heijningen… - Computers & …, 2021 - Elsevier
Today's mobile devices contain densely packaged system-on-chips (SoCs) with multi-core,
high-frequency CPUs and complex pipelines. In parallel, sophisticated SoC-assisted …

PwrLeak: Exploiting Power Reporting Interface for Side-Channel Attacks on AMD SEV

W Wang, M Li, Y Zhang, Z Lin - … Conference on Detection of Intrusions and …, 2023 - Springer
An increasing number of Trusted Execution Environment (TEE) is adopting to a variety of
commercial products for protecting data security on the cloud. However, TEEs are still …

Machine learning benchmarking for secured iot smart systems

MS Abdalzaher, MM Salim, HA Elsayed… - … on Internet of Things …, 2022 - ieeexplore.ieee.org
Smartness and IoT along with machine learning (ML) lead the research directions
nowadays. Smart city, smart campus, smart home, smart vehicle, etc; or if we call it “Smart x” …

Miracle: Micro-architectural leakage evaluation

B Marshall, D Page, J Webb - Cryptology ePrint Archive, 2021 - eprint.iacr.org
In this paper, we describe an extensible experimental infrastructure and methodology for
evaluating the micro-architectural leakage, based on power consumption, which stems from …

Toshi-towards secure heterogeneous integration: Security risks, threat assessment, and assurance

N Vashistha, ML Rahman, MSU Haque… - Cryptology ePrint …, 2022 - eprint.iacr.org
The semiconductor industry is entering a new age in which device scaling and cost
reduction will no longer follow the decades-long pattern. Packing more transistors on a …

Whispering devices: A survey on how side-channels lead to compromised information

C Lavaud, R Gerzaguet, M Gautier, O Berder… - Journal of Hardware and …, 2021 - Springer
While operating, information processing devices or communication systems may emit
unwanted signals (or alter existing ones) through electromagnetic waves, light, sound or …