Edge computing security: State of the art and challenges

Y Xiao, Y Jia, C Liu, X Cheng, J Yu… - Proceedings of the …, 2019 - ieeexplore.ieee.org
The rapid developments of the Internet of Things (IoT) and smart mobile devices in recent
years have been dramatically incentivizing the advancement of edge computing. On the one …

USB-based attacks

N Nissim, R Yahalom, Y Elovici - Computers & Security, 2017 - Elsevier
Attackers increasingly take advantage of innocent users who tend to use USB peripherals
casually, assuming these peripherals are benign when in fact they may carry an embedded …

[PDF][PDF] Towards automated dynamic analysis for linux-based embedded firmware.

DD Chen, M Woo, D Brumley, M Egele - NDSS, 2016 - ndss-symposium.org
Commercial-off-the-shelf (COTS) network-enabled embedded devices are usually controlled
by vendor firmware to perform integral functions in our daily lives. For example, wireless …

DTaint: detecting the taint-style vulnerability in embedded device firmware

K Cheng, Q Li, L Wang, Q Chen… - 2018 48th Annual …, 2018 - ieeexplore.ieee.org
A rising number of embedded devices are reachable in the cyberspace, such as routers,
cameras, printers, etc. Those devices usually run firmware whose code is proprietary with …

Confirm: Detecting firmware modifications in embedded systems using hardware performance counters

X Wang, C Konstantinou… - 2015 IEEE/ACM …, 2015 - ieeexplore.ieee.org
Critical infrastructure components nowadays use microprocessor-based embedded control
systems. It is often infeasible, however, to employ the same level of security measures used …

Hardware-assisted detection of firmware attacks in inverter-based cyberphysical microgrids

AP Kuruvila, I Zografopoulos, K Basu… - International Journal of …, 2021 - Elsevier
The electric grid modernization effort relies on the extensive deployment of microgrid (MG)
systems. MGs integrate renewable resources and energy storage systems, allowing to …

Maritime cybersecurity policy: the scope and impact of evolving technology on international shipping

K Tam, KD Jones - Journal of Cyber Policy, 2018 - Taylor & Francis
As the global maritime industry becomes increasingly dependent on advancing technology,
it is important for the world to be more aware of, and understand, the possible scope and …

[PDF][PDF] Badbluetooth: Breaking android security mechanisms via malicious bluetooth peripherals.

F Xu, W Diao, Z Li, J Chen, K Zhang - NDSS, 2019 - staff.ie.cuhk.edu.hk
Bluetooth is a widely used communication technology, especially under the scenarios of
mobile computing and Internet of Things. Once paired with a host device, a Bluetooth device …

Information Security Threats and Working from Home Culture: Taxonomy, Risk Assessment and Solutions

J Kotak, E Habler, O Brodt, A Shabtai, Y Elovici - Sensors, 2023 - mdpi.com
During the COVID-19 pandemic, most organizations were forced to implement a work-from-
home policy, and in many cases, employees have not been expected to return to the office …

[HTML][HTML] Time series-based detection and impact analysis of firmware attacks in microgrids

I Zografopoulos, AP Kuruvila, K Basu, C Konstantinou - Energy Reports, 2022 - Elsevier
Distributed generation (DG) and microgrids (MG) are critical components of future power
systems. However, the reliance of DGs and MG on resource-constrained embedded …