Z Xu, S Ray, P Subramanyan… - Design, Automation & Test …, 2017 - ieeexplore.ieee.org
Malicious software, referred to as malware, continues to grow in sophistication. Past proposals for malware detection have primarily focused on software-based detectors which …
Z Pan, J Sheldon, C Sudusinghe… - … , Automation & Test …, 2021 - ieeexplore.ieee.org
Malicious software, popularly known as malware, is a serious threat to modern computing systems. A comprehensive cybercrime study by Ponemon Institute highlights that malware is …
H Mohammadmoradi, O Gnawali - Proceedings of the 2nd International …, 2018 - dl.acm.org
Universal serial bus (USB) devices have widespread use in different computing platforms, including IoT gadgets, but this popularity makes them attractive targets for exploits and being …
To address the growing concerns about the security of embedded systems, it is important to perform accurate analysis of firmware binaries, even when the source code or the hardware …
With the rapid proliferation of IoT devices and its growing usage in safety-critical systems, securing these devices from malicious attacks has become increasingly challenging. Due to …
In recent years, with the rise of IoT technology, wireless Cyber-Physical Systems (CPS) have become widely deployed in critical infrastructure, including power generation, military …
Smartphone malware attacks are increasing alongside the growth of smartphone applications in the market. Researchers have proposed techniques to detect malware …
R Petrik, B Arik, JM Smith - Proceedings of the 2018 ACM SIGSAC …, 2018 - dl.acm.org
In this work, we take a fundamentally different approach to the problem of analyzing a device for compromises via malware; our approach is OS and instruction architecture independent …
M Rosso, J Renes, N Veshchikov… - … , Privacy and Applied …, 2021 - research.tue.nl
Widespread use of connected embedded devices as well as the increase of their computational power makes them a desirable target for cyber attacks. Detecting such attacks …