An anomaly based approach for HID attack detection using keystroke dynamics

FA Barbhuiya, T Saikia, S Nandi - … , December 12-13, 2012. Proceedings 4, 2012 - Springer
Recently, a new class of USB based attacks has emerged which unlike previous USB based
threats does not exploit any vulnerability or depend on any operating system feature. The …

[PDF][PDF] A Friend or a Foe? Detecting Malware using Memory and CPU Features.

J Milosevic, M Malek, A Ferrante - SECRYPT, 2016 - pdfs.semanticscholar.org
With an ever-increasing and ever more aggressive proliferation of malware, its detection is
of utmost importance. However, due to the fact that IoT devices are resource-constrained, it …

Personal Anomaly Detection and Smart-Phone Security

H Xiong, DD Yao - 2010 - vtechworks.lib.vt.edu
Mobile devices increasingly become the computing platform for networked applications such
as Web and email. This development requires strong guarantees on the system integrity and …

[引用][C] New methods for detecting malware infections and new attacks against hardware virtualization

G Pek - 2015 - Budapesti Műszaki és …

Shattered trust: When replacement smartphone components attack

O Shwartz, A Cohen, A Shabtai, Y Oren - 11th USENIX Workshop on …, 2017 - usenix.org
Phone touchscreens, and other similar hardware components such as orientation sensors,
wireless charging controllers, and NFC readers, are often produced by third-party …

Malware detection in embedded systems using neural network model for electromagnetic side-channel signals

HA Khan, N Sehatbakhsh, LN Nguyen… - Journal of Hardware and …, 2019 - Springer
We propose a novel malware detection system for critical embedded and cyber-physical
systems (CPS). The system exploits electromagnetic (EM) side-channel signals from the …

[PDF][PDF] Malware in IoT software and hardware

J Milosevic, N Sklavos, K Koutsikou - 2016 - upcommons.upc.edu
Internet of Things (IoT) devices have conquered the modern world, and they are increasingly
gaining ground day by day. Together, with their widespread use also interests from attackers …

Securing bluetooth low energy enabled industrial monitors

JG del Arroyo, J Bindewald… - … Conference on Cyber …, 2017 - books.google.com
The Bluetooth Low Energy (BLE) protocol is widely deployed on wireless devices in the
consumer market, where applications benefit from its low energy consumption and low …

Malboard: A novel user keystroke impersonation attack and trusted detection framework based on side-channel analysis

N Farhi, N Nissim, Y Elovici - Computers & Security, 2019 - Elsevier
Concealing malicious components within widely used USB peripherals has become a
popular attack vector utilizing social engineering techniques and exploiting users' trust in …

{POTUS}: Probing {Off-The-Shelf}{USB} Drivers with Symbolic Fault Injection

J Patrick-Evans, L Cavallaro, J Kinder - 11th USENIX Workshop on …, 2017 - usenix.org
USB client device drivers are a haven for software bugs, due to the sheer variety of devices
and the tendency of maintenance to slip as devices age. At the same time, the high privilege …