Detecting compromised IoT devices: Existing techniques, challenges, and a way forward
IoT devices, whether connected to the Internet or operating in a private network, are
vulnerable to cyber attacks from external or internal attackers or insiders who may succeed …
vulnerable to cyber attacks from external or internal attackers or insiders who may succeed …
Generative adversarial networks: A survey on attack and defense perspective
Generative Adversarial Networks (GANs) are a remarkable creation with regard to deep
generative models. Thanks to their ability to learn from complex data distributions, GANs …
generative models. Thanks to their ability to learn from complex data distributions, GANs …
Advances and open problems in federated learning
Federated learning (FL) is a machine learning setting where many clients (eg, mobile
devices or whole organizations) collaboratively train a model under the orchestration of a …
devices or whole organizations) collaboratively train a model under the orchestration of a …
An in-depth analysis of IoT security requirements, challenges, and their countermeasures via software-defined security
Internet of Things (IoT) is transforming everyone's life by providing features, such as
controlling and monitoring of the connected smart objects. IoT applications range over a …
controlling and monitoring of the connected smart objects. IoT applications range over a …
The effect of IoT new features on security and privacy: New threats, existing solutions, and challenges yet to be solved
Internet of Things (IoT) is an increasingly popular technology that enables physical devices,
vehicles, home appliances, etc., to communicate and even inter operate with one another. It …
vehicles, home appliances, etc., to communicate and even inter operate with one another. It …
C-FLAT: control-flow attestation for embedded systems software
Remote attestation is a crucial security service particularly relevant to increasingly popular
IoT (and other embedded) devices. It allows a trusted party (verifier) to learn the state of a …
IoT (and other embedded) devices. It allows a trusted party (verifier) to learn the state of a …
TrustLite: A security architecture for tiny embedded devices
Embedded systems are increasingly pervasive, interdependent and in many cases critical to
our every day life and safety. Tiny devices that cannot afford sophisticated hardware security …
our every day life and safety. Tiny devices that cannot afford sophisticated hardware security …
A survey of remote attestation in Internet of Things: Attacks, countermeasures, and prospects
The explosive growth of the Internet of Things (IoT) devices is an inevitable trend, especially
considering the fact that 5G technology facilitates numerous services building on IoT …
considering the fact that 5G technology facilitates numerous services building on IoT …
Security and privacy challenges in industrial internet of things
Today, embedded, mobile, and cyberphysical systems are ubiquitous and used in many
applications, from industrial control systems, modern vehicles, to critical infrastructure …
applications, from industrial control systems, modern vehicles, to critical infrastructure …
TyTAN: Tiny trust anchor for tiny devices
Embedded systems are at the core of many security-sensitive and safety-critical
applications, including automotive, industrial control systems, and critical infrastructures …
applications, including automotive, industrial control systems, and critical infrastructures …