Evolution, detection and analysis of malware for smart devices

G Suarez-Tangil, JE Tapiador… - … surveys & tutorials, 2013 - ieeexplore.ieee.org
Smart devices equipped with powerful sensing, computing and networking capabilities have
proliferated lately, ranging from popular smartphones and tablets to Internet appliances …

Malware detection using machine learning based analysis of virtual memory access patterns

Z Xu, S Ray, P Subramanyan… - Design, Automation & Test …, 2017 - ieeexplore.ieee.org
Malicious software, referred to as malware, continues to grow in sophistication. Past
proposals for malware detection have primarily focused on software-based detectors which …

Hardware-assisted malware detection using machine learning

Z Pan, J Sheldon, C Sudusinghe… - … , Automation & Test …, 2021 - ieeexplore.ieee.org
Malicious software, popularly known as malware, is a serious threat to modern computing
systems. A comprehensive cybercrime study by Ponemon Institute highlights that malware is …

Making whitelisting-based defense work against badusb

H Mohammadmoradi, O Gnawali - Proceedings of the 2nd International …, 2018 - dl.acm.org
Universal serial bus (USB) devices have widespread use in different computing platforms,
including IoT gadgets, but this popularity makes them attractive targets for exploits and being …

[PDF][PDF] AVATAR: A Framework to Support Dynamic Security Analysis of Embedded Systems' Firmwares.

J Zaddach, L Bruno, A Francillon, D Balzarotti - NDSS, 2014 - researchgate.net
To address the growing concerns about the security of embedded systems, it is important to
perform accurate analysis of firmware binaries, even when the source code or the hardware …

Malware Detection in Embedded Devices using Artificial Hardware Immunity

F Zareen, MAF Amador, R Karam - 2023 - researchsquare.com
With the rapid proliferation of IoT devices and its growing usage in safety-critical systems,
securing these devices from malicious attacks has become increasingly challenging. Due to …

Real-time instruction-level verification of remote IoT/CPS devices via side channels

Y Bai, J Park, M Tehranipoor, D Forte - Discover Internet of Things, 2022 - Springer
In recent years, with the rise of IoT technology, wireless Cyber-Physical Systems (CPS) have
become widely deployed in critical infrastructure, including power generation, military …

DroidLight: Lightweight anomaly-based intrusion detection system for smartphone devices

S Barbhuiya, P Kilpatrick, DS Nikolopoulos - Proceedings of the 21st …, 2020 - dl.acm.org
Smartphone malware attacks are increasing alongside the growth of smartphone
applications in the market. Researchers have proposed techniques to detect malware …

Towards architecture and OS-independent malware detection via memory forensics

R Petrik, B Arik, JM Smith - Proceedings of the 2018 ACM SIGSAC …, 2018 - dl.acm.org
In this work, we take a fundamentally different approach to the problem of analyzing a device
for compromises via malware; our approach is OS and instruction architecture independent …

Actionable malware classification in embedded environments using hardware performance counters

M Rosso, J Renes, N Veshchikov… - … , Privacy and Applied …, 2021 - research.tue.nl
Widespread use of connected embedded devices as well as the increase of their
computational power makes them a desirable target for cyber attacks. Detecting such attacks …