Remote non-intrusive malware detection for plcs based on chain of trust rooted in hardware

PHN Rajput, E Sarkar, D Tychalas… - 2021 IEEE European …, 2021 - ieeexplore.ieee.org
Digitization has been rapidly integrated with manufacturing industries and critical
infrastructure to increase efficiency, productivity, and reduce wastefulness, a transition being …

Deep neural network and transfer learning for accurate hardware-based zero-day malware detection

Z He, A Rezaei, H Homayoun, H Sayadi - Proceedings of the Great …, 2022 - dl.acm.org
In recent years, security researchers have shifted their attentions to the underlying
processors' architecture and proposed Hardware-Based Malware Detection (HMD) …

Malicious firmware detection with hardware performance counters

X Wang, C Konstantinou, M Maniatakos… - … on Multi-Scale …, 2016 - ieeexplore.ieee.org
Critical infrastructure components nowadays use microprocessor-based embedded control
systems. It is often infeasible, however, to employ the same level of security measures used …

[PDF][PDF] Towards automated dynamic analysis for linux-based embedded firmware.

DD Chen, M Woo, D Brumley, M Egele - NDSS, 2016 - ndss-symposium.org
Commercial-off-the-shelf (COTS) network-enabled embedded devices are usually controlled
by vendor firmware to perform integral functions in our daily lives. For example, wireless …

[引用][C] Analysis on smartphone devices for detection and prevention of malware.

M Alazab - 2014 - dro.deakin.edu.au
The specific goals in this thesis are to investigate weaknesses on the smartphone devices,
which leave it vulnerable to attacks by malicious applications, and to develop proficient …

Towards Protection Against a USB Device Whose Firmware Has Been Compromised or Turned as 'BadUSB'

U Shafique, SB Zahur - … in Information and Communication: Proceedings of …, 2020 - Springer
A BadUSB is a Universal Serial Bus (USB) device (usually a mass storage device) whose
firmware has been modified so as to spoof itself as another device (such as a keyboard) in …

Power-aware anomaly detection in smartphones: An analysis of on-platform versus externalized operation

G Suarez-Tangil, JE Tapiador, P Peris-Lopez… - Pervasive and Mobile …, 2015 - Elsevier
Many security problems in smartphones and other smart devices are approached from an
anomaly detection perspective in which the main goal reduces to identifying anomalous …

Static Malware Analysis using ELF features for Linux based IoT devices

A Ravi, V Chaturvedi - … Conference on VLSI Design and 2022 …, 2022 - ieeexplore.ieee.org
With the growing deployment of Internet of Things (IoT) devices in diverse domains, malware
authors have started using these devices as attack vectors for distributed attacks targeting …

Host identification via usb fingerprinting

L Letaw, J Pletcher, K Butler - 2011 Sixth IEEE International …, 2011 - ieeexplore.ieee.org
Determining a computer's identity is a challenge of critical importance to a forensics
investigator. However, relay and impersonation attacks can defeat even computers that …

Can data-only exploits be detected at runtime using hardware events? A case study of the Heartbleed vulnerability

G Torres, C Liu - Proceedings of the Hardware and Architectural Support …, 2016 - dl.acm.org
In this study, we investigate the feasibility of using an anomaly-based detection scheme that
utilizes information collected from hardware performance counters at runtime to detect data …