Whispering devices: A survey on how side-channels lead to compromised information

C Lavaud, R Gerzaguet, M Gautier, O Berder… - Journal of Hardware and …, 2021 - Springer
While operating, information processing devices or communication systems may emit
unwanted signals (or alter existing ones) through electromagnetic waves, light, sound or …

Hierarchical bidirectional RNN for safety-enhanced B5G heterogeneous networks

Y Xu, X Yan, Y Wu, Y Hu, W Liang… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
The emergence of the beyond 5G (B5G) mobile networks has provided us with a variety of
services and enriched our lives. The B5G super-heterogeneous network systems and highly …

A Study on Networked Industrial Robots in Smart Manufacturing: Vulnerabilities, Data Integrity Attacks and Countermeasures

X Shao, L **e, C Li, Z Wang - Journal of Intelligent & Robotic Systems, 2023 - Springer
The recent integration and collaboration of robots with networks expose new challenges and
problems in terms of security. However, to the best of our knowledge, there has not been any …

Intrusion detection in green internet of things: a deep deterministic policy gradient-based algorithm

L Nie, W Sun, S Wang, Z Ning… - IEEE Transactions …, 2021 - ieeexplore.ieee.org
Internet of Things (IoT) is an expanded application of Internet, which are used to provide
various services for users. Up to now, IoTs have received more attention, because it can …

Obfuscation revealed: Leveraging electromagnetic signals for obfuscated malware classification

DP Pham, D Marion, M Mastio, A Heuser - Proceedings of the 37th …, 2021 - dl.acm.org
The Internet of Things (IoT) is constituted of devices that are exponentially growing in
number and in complexity. They use numerous customized firmware and hardware, without …

Machine learning in wavelet domain for electromagnetic emission based malware analysis

N Chawla, H Kumar… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
This paper presents a signal processing and machine learning (ML) based methodology to
leverage Electromagnetic (EM) emissions from an embedded device to remotely detect a …

A new side-channel vulnerability on modern computers by exploiting electromagnetic emanations from the power management unit

N Sehatbakhsh, BB Yilmaz, A Zajic… - … Symposium on High …, 2020 - ieeexplore.ieee.org
This paper presents a new micro-architectural vulnerability on the power management units
of modern computers which creates an electromagnetic-based side-channel. The key …

Stealthminer: Specialized time series machine learning for run-time stealthy malware detection based on microarchitectural features

H Sayadi, Y Gao, H Mohammadi Makrani… - Proceedings of the …, 2020 - dl.acm.org
Hardware-Assisted Malware Detection (HMD) techniques deploy Machine Learning (ML)
classifiers to detect patterns of malicious applications based on microarchitectural features …

EMSim: A microarchitecture-level simulation tool for modeling electromagnetic side-channel signals

N Sehatbakhsh, BB Yilmaz, A Zajic… - … Symposium on High …, 2020 - ieeexplore.ieee.org
Side-channel attacks have become a serious security concern for computing systems,
especially for embedded devices, where the device is often located in, or in proximity to, a …

Detection of malware on the internet of things and its applications depends on long short-term memory network

K Priyadarsini, N Mishra, M Prasad, V Gupta… - Journal of Ambient …, 2021 - Springer
Abstract Internet of Things (IoT) is distressing this global with its creating implementations in
various pieces of growth, for instance, medicinal services, detecting, and far off checking …