Security and privacy in the emerging cyber-physical world: A survey
With the emergence of low-cost smart and connected IoT devices, the area of cyber-physical
security is becoming increasingly important. Past research has demonstrated new threat …
security is becoming increasingly important. Past research has demonstrated new threat …
Intel software guard extensions applications: A survey
Data confidentiality is a central concern in modern computer systems and services, as
sensitive data from users and companies are being increasingly delegated to such systems …
sensitive data from users and companies are being increasingly delegated to such systems …
Digital forensics and cyber forensics investigation: security challenges, limitations, open issues, and future direction
Digital forensics (DF) is the scientific investigation of digital criminal activities, illegal
attempts, and cyber-attacks through computer systems. It is becoming a crucial aspect of law …
attempts, and cyber-attacks through computer systems. It is becoming a crucial aspect of law …
A multi-dimensional machine learning approach to predict advanced malware
The growth of cyber-attacks that are carried out with malware have become more
sophisticated on almost all networks. Furthermore, attacks with advanced malware have the …
sophisticated on almost all networks. Furthermore, attacks with advanced malware have the …
TKRD: Trusted kernel rootkit detection for cybersecurity of VMs based on machine learning and memory forensic analysis
X Wang, J Zhang, A Zhang… - Mathematical Biosciences …, 2019 - strathprints.strath.ac.uk
The promotion of cloud computing makes the virtual machine (VM) increasingly a target of
malware attacks in cybersecurity such as those by kernel rootkits. Memory forensic, which …
malware attacks in cybersecurity such as those by kernel rootkits. Memory forensic, which …
Polyrhythm: Adaptive tuning of a multi-channel attack template for timing interference
As cyber-physical systems have become increasingly complex, rising computational
demand has led to the ubiquitous use of multicore processors in embedded environments …
demand has led to the ubiquitous use of multicore processors in embedded environments …
A novel principle to validate digital forensic models
Digital forensic models (DFMs) form the base for any digital investigation because they
guide the investigators with necessary steps and procedures to be taken during the …
guide the investigators with necessary steps and procedures to be taken during the …
Abusing trust: Mobile kernel subversion via trustzone rootkits
The Arm TrustZone is the de facto standard for hardware-backed Trusted Execution
Environments (TEEs) on mobile devices, providing isolation for secure computations to be …
Environments (TEEs) on mobile devices, providing isolation for secure computations to be …
Decrypting live SSH traffic in virtual environments
Decrypting and inspecting encrypted malicious communications may assist crime detection
and prevention. Access to client or server memory enables the discovery of artefacts …
and prevention. Access to client or server memory enables the discovery of artefacts …
Work-in-progress: Measuring security protection in real-time embedded firmware
The proliferation of real-time cyber-physical systems (CPS) is making profound changes to
our daily life. Many real-time CPSs are security and safety-critical because of their …
our daily life. Many real-time CPSs are security and safety-critical because of their …