A survey on recent advanced research of CPS security

Z Wang, W Xie, B Wang, J Tao, E Wang - Applied Sciences, 2021 - mdpi.com
Cyber-physical systems (CPSs) are next-generation intelligent systems that integrate
computing, communication, and control. Malicious attacks on CPSs can lead to both …

The Circle of life: A {large-scale} study of the {IoT} malware lifecycle

O Alrawi, C Lever, K Valakuzhy, K Snow… - 30th USENIX Security …, 2021 - usenix.org
Our current defenses against IoT malware may not be adequate to remediate an IoT
malware attack similar to the Mirai botnet. This work seeks to investigate this matter by …

[PDF][PDF] On offloading network forensic analytics to programmable data plane switches

K Friday - World ScientificNow Publishers series in business, 2021 - par.nsf.gov
A pril 1 6, 2 0 2 1 1 7: 2 2 ws-r v 9 x 6 B ook Titl em ai npage 2 p artic ul ar, t he first use c ase
em pl o ys dyna mic t hres h ol ds ge ner ate d fr om re al-ti me artif act st atistics e xtr acte …

Stepping out of the MUD: contextual network threat information for IoT devices with manufacturer-provided behavioural profiles

L Morgese - 2021 - essay.utwente.nl
Besides the unprecedented benefits that the Internet of Things (IoT) brings, it comes with a
lack of adequate security measures, leading to attacks multiplying every year. Enhancing …

Data-Driven Approaches for Detecting Malware-Infected IoT Devices and Characterizing Their Unsolicited Behaviors by Leveraging Passive Internet Measurements

S Torabi - 2021 - spectrum.library.concordia.ca
Despite the benefits of Internet of Things (IoT) devices, the insecurity of IoT and their
deployment nature have turned them into attractive targets for adversaries, which …

Analysis of Internet Telescope Data for IoT Cyber Threat Intelligence

MS Pour - 2021 - search.proquest.com
Due to the immense proliferation of the Internet of Things (IoT) devices across all levels (eg,
homes, businesses and industries), entangled with an abundance of vulnerabilities and …

[PDF][PDF] The Circle Of Life: A Large-Scale Study of The IoT Malware Lifecycle

K Snow, F Monrose, M Antonakakis - usenix.org
Our current defenses against IoT malware may not be adequate to remediate an IoT
malware attack similar to the Mirai botnet. This work seeks to investigate this matter by …