Detecting compromised IoT devices: Existing techniques, challenges, and a way forward

I Makhdoom, M Abolhasan, D Franklin, J Lipman… - Computers & …, 2023 - Elsevier
IoT devices, whether connected to the Internet or operating in a private network, are
vulnerable to cyber attacks from external or internal attackers or insiders who may succeed …

Generative adversarial networks: A survey on attack and defense perspective

C Zhang, S Yu, Z Tian, JJQ Yu - ACM Computing Surveys, 2023 - dl.acm.org
Generative Adversarial Networks (GANs) are a remarkable creation with regard to deep
generative models. Thanks to their ability to learn from complex data distributions, GANs …

Advances and open problems in federated learning

P Kairouz, HB McMahan, B Avent… - … and trends® in …, 2021 - nowpublishers.com
Federated learning (FL) is a machine learning setting where many clients (eg, mobile
devices or whole organizations) collaboratively train a model under the orchestration of a …

An in-depth analysis of IoT security requirements, challenges, and their countermeasures via software-defined security

W Iqbal, H Abbas, M Daneshmand… - IEEE Internet of …, 2020 - ieeexplore.ieee.org
Internet of Things (IoT) is transforming everyone's life by providing features, such as
controlling and monitoring of the connected smart objects. IoT applications range over a …

The effect of IoT new features on security and privacy: New threats, existing solutions, and challenges yet to be solved

W Zhou, Y Jia, A Peng, Y Zhang… - IEEE Internet of things …, 2018 - ieeexplore.ieee.org
Internet of Things (IoT) is an increasingly popular technology that enables physical devices,
vehicles, home appliances, etc., to communicate and even inter operate with one another. It …

C-FLAT: control-flow attestation for embedded systems software

T Abera, N Asokan, L Davi, JE Ekberg… - Proceedings of the …, 2016 - dl.acm.org
Remote attestation is a crucial security service particularly relevant to increasingly popular
IoT (and other embedded) devices. It allows a trusted party (verifier) to learn the state of a …

TrustLite: A security architecture for tiny embedded devices

P Koeberl, S Schulz, AR Sadeghi… - Proceedings of the Ninth …, 2014 - dl.acm.org
Embedded systems are increasingly pervasive, interdependent and in many cases critical to
our every day life and safety. Tiny devices that cannot afford sophisticated hardware security …

A survey of remote attestation in Internet of Things: Attacks, countermeasures, and prospects

B Kuang, A Fu, W Susilo, S Yu, Y Gao - Computers & Security, 2022 - Elsevier
The explosive growth of the Internet of Things (IoT) devices is an inevitable trend, especially
considering the fact that 5G technology facilitates numerous services building on IoT …

Security and privacy challenges in industrial internet of things

AR Sadeghi, C Wachsmann, M Waidner - Proceedings of the 52nd …, 2015 - dl.acm.org
Today, embedded, mobile, and cyberphysical systems are ubiquitous and used in many
applications, from industrial control systems, modern vehicles, to critical infrastructure …

TyTAN: Tiny trust anchor for tiny devices

F Brasser, B El Mahjoub, AR Sadeghi… - Proceedings of the …, 2015 - dl.acm.org
Embedded systems are at the core of many security-sensitive and safety-critical
applications, including automotive, industrial control systems, and critical infrastructures …