DroidLight: Lightweight anomaly-based intrusion detection system for smartphone devices

S Barbhuiya, P Kilpatrick, DS Nikolopoulos - Proceedings of the 21st …, 2020 - dl.acm.org
Smartphone malware attacks are increasing alongside the growth of smartphone
applications in the market. Researchers have proposed techniques to detect malware …

Mouse trap: Exploiting firmware updates in {USB} peripherals

J Maskiewicz, B Ellis, J Mouradian… - 8th USENIX Workshop on …, 2014 - usenix.org
Although many users are aware of the threats that malware pose, users are unaware that
malware can infect peripheral devices. Many embedded devices support firmware update …

Towards architecture and OS-independent malware detection via memory forensics

R Petrik, B Arik, JM Smith - Proceedings of the 2018 ACM SIGSAC …, 2018 - dl.acm.org
In this work, we take a fundamentally different approach to the problem of analyzing a device
for compromises via malware; our approach is OS and instruction architecture independent …

Toward Hardware-Assisted Malware Detection Utilizing Explainable Machine Learning: A Survey

Y Nasser, M Nassar - IEEE Access, 2023 - ieeexplore.ieee.org
Hardware joined the battle against malware by introducing secure boot architectures,
malware-aware processors, and trusted platform modules. Hardware performance …

Making {USB} great again with {USBFILTER}

DJ Tian, N Scaife, A Bates, K Butler… - 25th USENIX Security …, 2016 - usenix.org
USB provides ubiquitous plug-and-play connectivity for a wide range of devices. However,
the complex nature of USB obscures the true functionality of devices from the user, and …

Actionable malware classification in embedded environments using hardware performance counters

M Rosso, J Renes, N Veshchikov… - … , Privacy and Applied …, 2021 - research.tue.nl
Widespread use of connected embedded devices as well as the increase of their
computational power makes them a desirable target for cyber attacks. Detecting such attacks …

[PDF][PDF] USBiquitous: USB intrusion toolkit

B Camredon - SSTIC 2016, 2016 - airbus-seclab.github.io
The USBiquitous project is a set of open source tools to interact with USB communications. It
is composed of a hardware part embedding a Linux system with a bespoke kernel module …

Exploring the taxonomy of USB-based attacks

M Mamchenko, A Sabanov - 2019 Twelfth International …, 2019 - ieeexplore.ieee.org
A variety of USB-based attacks is being increased rapidly. Researchers manage to identify
more and more threats and vulnerabilities, often with proof-of-concept practical …

Unsupervised anomaly-based malware detection using hardware features

A Tang, S Sethumadhavan, SJ Stolfo - Research in Attacks, Intrusions and …, 2014 - Springer
Recent works have shown promise in detecting malware programs based on their dynamic
microarchitectural execution patterns. Compared to higher-level features like OS and …

Platform-independent malware analysis applicable to windows and linux environments

C Hwang, J Hwang, J Kwak, T Lee - Electronics, 2020 - mdpi.com
Most cyberattacks use malicious codes, and according to AV-TEST, more than 1 billion
malicious codes are expected to emerge in 2020. Although such malicious codes have been …