Securing the Industrial Internet of Things against ransomware attacks: A comprehensive analysis of the emerging threat landscape and detection mechanisms
Due to the complexity and diversity of Industrial Internet of Things (IIoT) systems, which
include heterogeneous devices, legacy and new connectivity protocols and systems, and …
include heterogeneous devices, legacy and new connectivity protocols and systems, and …
Tight arms race: Overview of current malware threats and trends in their detection
Cyber attacks are currently blooming, as the attackers reap significant profits from them and
face a limited risk when compared to committing the “classical” crimes. One of the major …
face a limited risk when compared to committing the “classical” crimes. One of the major …
pAElla: Edge AI-Based Real-Time Malware Detection in Data Centers
The increasing use of Internet-of-Things (IoT) devices for monitoring a wide spectrum of
applications, along with the challenges of “big data” streaming support they often require for …
applications, along with the challenges of “big data” streaming support they often require for …
Rascv2: Enabling remote access to side-channels for mission critical and iot systems
The Internet of Things (IoT) and smart devices are currently being deployed in systems such
as autonomous vehicles and medical monitoring devices. The introduction of IoT devices …
as autonomous vehicles and medical monitoring devices. The introduction of IoT devices …
A cyber-physical system to detect IoT security threats of a smart home heterogeneous wireless sensor node
AKMJA Majumder, CB Veilleux, JD Miller - IEEE Access, 2020 - ieeexplore.ieee.org
The advent of the Internet of Things (IoT) allows the Cyber-Physical System (CPS)
components to communicate with other devices, and to interact with safety-critical systems …
components to communicate with other devices, and to interact with safety-critical systems …
XMD: An expansive Hardware-telemetry based Mobile Malware Detector for Endpoint Detection
Hardware-based Malware Detectors (HMDs) have shown promise in detecting malicious
workloads. However, the current HMDs focus solely on the CPU core of a System-on-Chip …
workloads. However, the current HMDs focus solely on the CPU core of a System-on-Chip …
Toward Hardware-Assisted Malware Detection Utilizing Explainable Machine Learning: A Survey
Hardware joined the battle against malware by introducing secure boot architectures,
malware-aware processors, and trusted platform modules. Hardware performance …
malware-aware processors, and trusted platform modules. Hardware performance …
Malware detection using power consumption and network traffic data
JH Jimenez… - 2019 2nd International …, 2019 - ieeexplore.ieee.org
Even though malware detection is an active area of research, not many works have used
features extracted from physical properties, such as power consumption. This paper is …
features extracted from physical properties, such as power consumption. This paper is …
Energy audition based cyber-physical attack detection system in IoT
In this paper, we propose an attack detection framework in the Internet of Things (IoT)
devices. The framework applies a data-centric method to process the energy consumption …
devices. The framework applies a data-centric method to process the energy consumption …
Creation of a dataset modeling the behavior of malware affecting the confidentiality of data managed by IoT devices
Abstract Internet-of-Things (IoT) platforms are vulnerable to cyberattacks due to their
exposition to the internet and the resource-constrained capabilities of their devices …
exposition to the internet and the resource-constrained capabilities of their devices …