A survey of honeypots and honeynets for internet of things, industrial internet of things, and cyber-physical systems
The Internet of Things (IoT), the Industrial Internet of Things (IIoT), and Cyber-Physical
Systems (CPS) have become essential for our daily lives in contexts such as our homes …
Systems (CPS) have become essential for our daily lives in contexts such as our homes …
[HTML][HTML] Tools and Techniques for Collection and Analysis of Internet-of-Things malware: A systematic state-of-art review
IoT devices which include wireless sensors, software, actuators, and computer devices
operated through the Internet, enable the transfer of data among objects or people …
operated through the Internet, enable the transfer of data among objects or people …
[PDF][PDF] You Are What You Do: Hunting Stealthy Malware via Data Provenance Analysis.
To subvert recent advances in perimeter and host security, the attacker community has
developed and employed various attack vectors to make a malware much stealthier than …
developed and employed various attack vectors to make a malware much stealthier than …
The Circle of life: A {large-scale} study of the {IoT} malware lifecycle
Our current defenses against IoT malware may not be adequate to remediate an IoT
malware attack similar to the Mirai botnet. This work seeks to investigate this matter by …
malware attack similar to the Mirai botnet. This work seeks to investigate this matter by …
Evading {Provenance-Based}{ML} detectors with adversarial system actions
We present PROVNINJA, a framework designed to generate adversarial attacks that aim to
elude provenance-based Machine Learning (ML) security detectors. PROVNINJA is …
elude provenance-based Machine Learning (ML) security detectors. PROVNINJA is …
Survivalism: Systematic analysis of windows malware living-off-the-land
As malware detection algorithms and methods become more sophisticated, malware
authors adopt equally sophisticated evasion mechanisms to defeat them. Anecdotal …
authors adopt equally sophisticated evasion mechanisms to defeat them. Anecdotal …
An insight into the machine-learning-based fileless malware detection
In recent years, massive development in the malware industry changed the entire landscape
for malware development. Therefore, cybercriminals became more sophisticated by …
for malware development. Therefore, cybercriminals became more sophisticated by …
A survey on edge computing for wearable technology
Smart wearable devices have become more and more popular in our daily life due to their
unique power of “wearing-while-using.” However, requirements of light weight and compact …
unique power of “wearing-while-using.” However, requirements of light weight and compact …
A survey of cybersecurity of digital manufacturing
The Industry 4.0 concept promotes a digital manufacturing (DM) paradigm that can enhance
quality and productivity, which reduces inventory and the lead time for delivering custom …
quality and productivity, which reduces inventory and the lead time for delivering custom …
{Plug-N-Pwned}: Comprehensive vulnerability analysis of {OBD-II} dongles as a new {Over-the-Air} attack surface in automotive {IoT}
With the growing trend of the Internet of Things, a large number of wireless OBD-II dongles
are developed, which can be simply plugged into vehicles to enable remote functions such …
are developed, which can be simply plugged into vehicles to enable remote functions such …