A survey on recent advanced research of CPS security

Z Wang, W **e, B Wang, J Tao, E Wang - Applied Sciences, 2021‏ - mdpi.com
Cyber-physical systems (CPSs) are next-generation intelligent systems that integrate
computing, communication, and control. Malicious attacks on CPSs can lead to both …

Stack-based buffer overflow detection using recurrent neural networks

WA Dahl, L Erdodi, FM Zennaro - arxiv preprint arxiv:2012.15116, 2020‏ - arxiv.org
Detecting vulnerabilities in software is a critical challenge in the development and
deployment of applications. One of the most known and dangerous vulnerabilities is stack …

Hardware performance counters based runtime anomaly detection using SVM

MFB Abbas, SP Kadiyala, A Prakash… - 2017 TRON …, 2017‏ - ieeexplore.ieee.org
The nature of ever evolving anomalies have become more sophisticated and complex in
attacking the defense schemes, thereby leading to serious compromises. Existing software …

Phylax: Snapshot-based profiling of real-time embedded devices via jtag interface

C Konstantinou, E Chielle… - … Design, Automation & …, 2018‏ - ieeexplore.ieee.org
Real-time embedded systems play a significant role in the functionality of critical
infrastructure. Legacy microprocessor-based embedded systems, however, have not been …

LAMBDA: Lightweight assessment of malware for emBeddeD architectures

SP Kadiyala, M Alam, Y Shrivastava… - ACM Transactions on …, 2020‏ - dl.acm.org
Security is a critical aspect in many of the latest embedded and IoT systems. Malware is one
of the severe threats of security for such devices. There have been enormous efforts in …

TZEAMM: An Efficient and Secure Active Measurement Method Based on TrustZone

X Liu, Y Lai, J Liu, S Luo - Security and Communication …, 2023‏ - Wiley Online Library
With the rapid development of computer and communication technology, embedded
systems are widely used in smart devices. The increasing connectivity of these systems and …

Using hardware performance counters to detect control hijacking attacks

M Yu, B Halak, M Zwolinski - 2019 IEEE 4th International …, 2019‏ - ieeexplore.ieee.org
Code reuse techniques can circumvent existing security measures. For example, attacks
such as Return Oriented Programming (ROP) use fragments of the existing code base to …

Hardware support for embedded operating system security

A Pouraghily, T Wolf, R Tessier - 2017 IEEE 28th International …, 2017‏ - ieeexplore.ieee.org
Internet-connected embedded systems have limited capabilities to defend themselves
against remote hacking attacks. The potential effects of such attacks, however, can have a …

NIRVANA: Non-Invasive Real-Time VulnerAbility ANAlysis for RISC-V Processor

J Zhu, X Zhu, M Borowski, H Zhang… - … Conference on Omni …, 2024‏ - ieeexplore.ieee.org
Embedded systems are increasingly susceptible to attack from malicious software, posing a
significant threat to critical infrastructure and data. Various shreds of evidence reveal the …

Internet of things based hybrid cryptography for process data security

JS Prasath, U Ramachandraiah, S Prabhuraj… - J. Math. Comput …, 2020‏ - scik.org
This manuscript addresses security issues, security mechanisms of Internet of Things (IoT)
and implementation of hybrid cryptography for preserving the process information against …