Machine learning for intrusion detection in industrial control systems: Applications, challenges, and recommendations

MA Umer, KN Junejo, MT Jilani, AP Mathur - International Journal of …, 2022 - Elsevier
Methods from machine learning are used in the design of secure Industrial Control Systems.
Such methods focus on two major areas: detection of intrusions at the network level using …

Sok: The challenges, pitfalls, and perils of using hardware performance counters for security

S Das, J Werner, M Antonakakis… - … IEEE symposium on …, 2019 - ieeexplore.ieee.org
Hardware Performance Counters (HPCs) have been available in processors for more than a
decade. These counters can be used to monitor and measure events that occur at the CPU …

A comprehensive study of security and privacy guidelines, threats, and countermeasures: An IoT perspective

HA Abdul-Ghani, D Konstantas - Journal of Sensor and Actuator …, 2019 - mdpi.com
As Internet of Things (IoT) involvement increases in our daily lives, several security and
privacy concerns like linkability, unauthorized conversations, and side-channel attacks are …

Intelligent malware detection based on hardware performance counters: A comprehensive survey

H Sayadi, Z He, HM Makrani… - 2024 25th International …, 2024 - ieeexplore.ieee.org
The growing complexity of contemporary computing systems heightens susceptibility to
emerging cyber threats. Recent advancements in computer architecture security leverage …

Hardware-assisted detection of firmware attacks in inverter-based cyberphysical microgrids

AP Kuruvila, I Zografopoulos, K Basu… - International Journal of …, 2021 - Elsevier
The electric grid modernization effort relies on the extensive deployment of microgrid (MG)
systems. MGs integrate renewable resources and energy storage systems, allowing to …

Anomaly detection in real-time multi-threaded processes using hardware performance counters

P Krishnamurthy, R Karri… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
We propose a novel methodology for real-time monitoring of software running on embedded
processors in cyber-physical systems (CPS). The approach uses real-time monitoring of …

A theoretical study of hardware performance counters-based malware detection

K Basu, P Krishnamurthy, F Khorrami… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Malware can range from simple adware to stealthy kernel control-flow modifying rootkits.
Although anti-virus software is popular, an ongoing cat-and-mouse cycle of anti-virus …

Operational and economy-wide impacts of compound cyber-attacks and extreme weather events on electric power networks

C Avraam, L Ceferino, Y Dvorkin - Applied Energy, 2023 - Elsevier
The growing frequencies of extreme weather events and cyber-attacks give rise to a novel
threat where a malicious cyber actor aims to disrupt stressed components of critical …

Fight hardware with hardware: Systemwide detection and mitigation of side-channel attacks using performance counters

S Carnà, S Ferracci, F Quaglia… - Digital Threats: Research …, 2023 - dl.acm.org
We present a kernel-level infrastructure that allows systemwide detection of malicious
applications attempting to exploit cache-based side-channel attacks to break the process …

Hardware-layer intelligence collection for smart grid embedded systems

C Konstantinou, M Maniatakos - Journal of Hardware and Systems …, 2019 - Springer
Smart grids include a variety of microprocessor-based embedded systems, interconnected
with communication technologies. In this interaction, hardware is the lower level of …