Hardware-assisted machine learning in resource-constrained IoT environments for security: review and future prospective

G Kornaros - IEEE Access, 2022 - ieeexplore.ieee.org
As the Internet of Things (IoT) technology advances, billions of multidisciplinary smart
devices act in concert, rarely requiring human intervention, posing significant challenges in …

Contemporary advances in multi-access edge computing: A survey of fundamentals, architecture, technologies, deployment cases, security, challenges, and directions

M Mahbub, RM Shubair - Journal of Network and Computer Applications, 2023 - Elsevier
With advancements of cloud technologies Multi-Access Edge Computing (MEC) emerged as
a remarkable edge-cloud technology to provide computing facilities to resource-restrained …

A survey on hardware vulnerability analysis using machine learning

Z Pan, P Mishra - IEEE Access, 2022 - ieeexplore.ieee.org
Electronic systems rely on efficient hardware, popularly known as system-on-chip (SoC), to
support its core functionalities. A typical SoC consists of diverse components gathered from …

Sok: Can we really detect cache side-channel attacks by monitoring performance counters?

W Kosasih, Y Feng, C Chuengsatiansup… - Proceedings of the 19th …, 2024 - dl.acm.org
Sharing microarchitectural components between co-resident programs leads to potential
information leaks, with devastating implications on security. Over the last decade, multiple …

Processor security: Detecting microarchitectural attacks via count-min sketches

K Arıkan, A Palumbo, L Cassano… - … Transactions on Very …, 2022 - ieeexplore.ieee.org
The continuous quest for performance pushed processors to incorporate elements such as
multiple cores, caches, acceleration units, or speculative execution that make systems very …

Exploring the Abyss? Unveiling Systems-on-Chip Hardware Vulnerabilities beneath Software

SR Rajendran, NF Dipu, S Tarek… - IEEE Transactions …, 2024 - ieeexplore.ieee.org
Due to the increasing size and complexity of system-on-chips (SoCs), new threats and
vulnerabilities are emerging, mainly related to flaws at the system level. Due to the lack of …

Evaluation of machine learning-based detection against side-channel attacks on autonomous vehicle

H Wang, S Salehi, H Sayadi, A Sasan… - 2021 IEEE 3rd …, 2021 - ieeexplore.ieee.org
Autonomous vehicles are becoming increasingly popular, but their reliance on computer
systems to sense and operate in the physical world has introduced new security risks …

A survey on machine learning in hardware security

TÇ Köylü, CR Wedig Reinbrecht… - ACM Journal on …, 2023 - dl.acm.org
Hardware security is currently a very influential domain, where each year countless works
are published concerning attacks against hardware and countermeasures. A significant …

Scaguard: Detection and classification of cache side-channel attacks via attack behavior modeling and similarity comparison

L Wang, L Bu, F Song - 2023 60th ACM/IEEE Design …, 2023 - ieeexplore.ieee.org
Cache side-channel attacks (CSCAs), capable of deducing secrets by analyzing timing
differences in the shared cache behavior of modern processors, pose a serious security …

[PDF][PDF] A cautionary tale about detecting malware using hardware performance counters and machine learning

B Zhou, A Gupta, R Jahanshahi, M Egele, A Joshi - IEEE Design & Test, 2021 - megele.io
Electrical and Computer Engineering Department, Boston University, Boston, MA 02215
USA the program's behavior. As software-level behavioral analysis performs malware …