[HTML][HTML] A comprehensive survey on IoT attacks: Taxonomy, detection mechanisms and challenges
T Sasi, AH Lashkari, R Lu, P ** high-level programming languages to hardware …
Vehicle security: A survey of security issues and vulnerabilities, malware attacks and defenses
Recent years have led the path to the evolution of automotive technology and with these
new developments, modern vehicles are getting increasingly astute and offering growing …
new developments, modern vehicles are getting increasingly astute and offering growing …
Hardware-assisted detection of firmware attacks in inverter-based cyberphysical microgrids
The electric grid modernization effort relies on the extensive deployment of microgrid (MG)
systems. MGs integrate renewable resources and energy storage systems, allowing to …
systems. MGs integrate renewable resources and energy storage systems, allowing to …
Comparative analysis of low-dimensional features and tree-based ensembles for malware detection systems
S Euh, H Lee, D Kim, D Hwang - IEEE Access, 2020 - ieeexplore.ieee.org
Advances in machine learning algorithms have improved the performance of malware
detection systems for the last decade. However, there are still some challenges such as …
detection systems for the last decade. However, there are still some challenges such as …
Adversarial attack on microarchitectural events based malware detectors
SMP Dinakarrao, S Amberkar, S Bhat… - Proceedings of the 56th …, 2019 - dl.acm.org
To overcome the performance overheads incurred by the traditional software-based
malware detection techniques, Hardware-assisted Malware Detection (HMD) using machine …
malware detection techniques, Hardware-assisted Malware Detection (HMD) using machine …
Towards accurate run-time hardware-assisted stealthy malware detection: a lightweight, yet effective time series CNN-based approach
According to recent security analysis reports, malicious software (aka malware) is rising at
an alarming rate in numbers, complexity, and harmful purposes to compromise the security …
an alarming rate in numbers, complexity, and harmful purposes to compromise the security …
Deep neural network and transfer learning for accurate hardware-based zero-day malware detection
In recent years, security researchers have shifted their attentions to the underlying
processors' architecture and proposed Hardware-Based Malware Detection (HMD) …
processors' architecture and proposed Hardware-Based Malware Detection (HMD) …