Field programmable gate array applications—A scientometric review

J Ruiz-Rosero, G Ramirez-Gonzalez, R Khanna - Computation, 2019 - mdpi.com
Field Programmable Gate Array (FPGA) is a general purpose programmable logic device
that can be configured by a customer after manufacturing to perform from a simple logic gate …

Semantics-based online malware detection: Towards efficient real-time protection against malware

S Das, Y Liu, W Zhang… - IEEE transactions on …, 2015 - ieeexplore.ieee.org
Recently, malware has increasingly become a critical threat to embedded systems, while the
conventional software solutions, such as antivirus and patches, have not been so successful …

Eddie: Em-based detection of deviations in program execution

A Nazari, N Sehatbakhsh, M Alam, A Zajic… - Proceedings of the 44th …, 2017 - dl.acm.org
This paper describes EM-Based Detection of Deviations in Program Execution (EDDIE), a
new method for detecting anomalies in program execution, such as malware and other code …

Intelligent intrusion detection in low-power IoTs

A Saeed, A Ahmadinia, A Javed, H Larijani - ACM Transactions on …, 2016 - dl.acm.org
Security and privacy of data are one of the prime concerns in today's Internet of Things (IoT).
Conventional security techniques like signature-based detection of malware and regular …

HEAVEN: A Hardware-Enhanced AntiVirus ENgine to accelerate real-time, signature-based malware detection

M Botacin, MZ Alves, D Oliveira, A Grégio - Expert Systems with …, 2022 - Elsevier
Antiviruses (AVs) are computing-intensive applications that rely on constant monitoring of
OS events and on applying pattern matching procedures on binaries to detect malware. In …

A survey of hardware-based control flow integrity (CFI)

R De Clercq, I Verbauwhede - arXiv preprint arXiv:1706.07257, 2017 - arxiv.org
CFI is a computer security technique that detects runtime attacks by monitoring a program's
branching behavior. This work presents a detailed analysis of the security policies enforced …

A fine-grained control flow integrity approach against runtime memory attacks for embedded systems

S Das, W Zhang, Y Liu - … on Very Large Scale Integration (VLSI …, 2016 - ieeexplore.ieee.org
Runtime attacks on memory, such as buffer overflow based stack smashing and code reuse
attacks, are common in embedded systems. Control flow integrity (CFI) has been …

IoT Device security through dynamic hardware isolation with cloud-Based update

F Hategekimana, TJL Whitaker, MJH Pantho… - Journal of Systems …, 2020 - Elsevier
This work proposes a novel approach to provide comprehensive security to IoT devices. Our
approach is based on a reconfigurable hardware-based isolation and protection mechanism …

Secure sensor prototype using hardware security modules and trusted execution environments in a blockchain application: wine logistic use case

AJ Cabrera-Gutiérrez, E Castillo, A Escobar-Molero… - Electronics, 2023 - mdpi.com
The security of Industrial Internet of Things (IIoT) systems is a challenge that needs to be
addressed immediately, as the increasing use of new communication paradigms and the …

Low-complexity signature-based malware detection for IoT devices

MFB Abbas, T Srikanthan - … and Techniques in Information Security: 8th …, 2017 - Springer
The ominous threat from malware in critical systems has forced system designers to include
detection techniques in their systems to ensure a timely response. However, the widely used …