USB-watch: A generalized hardware-assisted insider threat detection framework

K Denney, L Babun, AS Uluagac - … of Hardware and Systems Security, 2020 - Springer
… the HID injection attack described above to any generic USB device that is capable of …
Hence, this work aims to provide a dynamic, hardware-based intrusion detection framework …

Countermeasures Against Hardware Trojans

A Belous, V Saladukha, A Belous… - Viruses, Hardware and …, 2020 - Springer
dynamic assessment of equipment verification during its operation is suggested in the work
[23]. It consists in detecting the hardware … (incorrect) results are dynamically fined, ie, they are …

Electrical-level attacks on CPUs, FPGAs, and GPUs: Survey and implications in the heterogeneous era

DG Mahmoud, V Lenders, M Stojilović - ACM Computing Surveys (CSUR …, 2022 - dl.acm.org
… error-based attack on dynamic random access memories (… proposed as detection methods
for RowHammer attacks [235]… that hardware-based SCA attacks on GPUs are a real threat. …

Learning malicious circuits in FPGA bitstreams

R Elnaggar, J Chaudhuri, R Karri… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
… FPGAs can be dynamically reconfigured, offering the ability to update … and peripherals
such as Ethernet and USB ports. … for malicious circuit detection (especially hardware Trojans) …

Leveraging side-channel signals for IoT malware classification and rootkit detection

DP Pham - 2022 - theses.hal.science
… Malware detection relying on static and dynamic features still … attack vectors as well as IoT
malware detection challenges. … plugging a USB device with malicious software into the device. …

A survey on sensor-based threats and attacks to smart devices and applications

AK Sikder, G Petracca, H Aksu… - … Surveys & Tutorials, 2021 - ieeexplore.ieee.org
… , or trigger a malicious activity to compromise the device. In … We also summarize the
shortcomings of existing systems in detecting … Most of the smart devices use USB for …

Automated analysis approach for the detection of high survivable ransomwares

YA Ahmed - 2020 - acikerisim.selcuk.edu.tr
… Against this destructive malicious program, the dynamic analysis approach is the most
popular approach for detecting such an attack. The majority of dynamic analysis relies on the …

[PDF][PDF] Defense and Analysis of Hijacking User Login Credentials via Remote Code Execution and Raspberry PI

P Nishitkumar, H Wimmer, L Powell… - Proceedings of the …, 2020 - academia.edu
… physical access and use a USB device to implant a payload via … to detect the Wi-Fi hotspot
on the victim PC shown as “P4wnP1” … network weaknesses by executing attacks through USB

Bayesimposter: Bayesian estimation based. bss imposter attack on industrial control systems

A Barua, L Pan, MAA Faruque - … of the 38th Annual Computer Security …, 2022 - dl.acm.org
… We demonstrate that BayesImposter can predictively inject … ) of every section that tells the
dynamic linker how to map every … be broadly classified as attacks on physical hardware (eg, …

Hardware Security in India: The Journey so Far

D Mukhopadhyay - Cyber Security in India: Education, Research and …, 2020 - Springer
detection methodologies for such side-channel attacks as an … to Intel Edison Board via
USB interface to form an IoT node. … is then calculated using the Dynamic Time Warping (DTW) …