Intrusion detection systems (IDSs) employ sophisticated security techniques to detect malicious activities on hosts and/or networks. IDSs have been utilized to ensure the security …
Robotic vehicles (RVs), such as drones and ground rovers, are a type of cyber-physical systems that operate in the physical world under the control of computing components in the …
L Cheng, K Tian, D Yao - Proceedings of the 33rd Annual Computer …, 2017 - dl.acm.org
Recent studies have revealed that control programs running on embedded devices suffer from both control-oriented attacks (eg, code-injection or code-reuse attacks) and data …
Security and privacy of data are one of the prime concerns in today's Internet of Things (IoT). Conventional security techniques like signature-based detection of malware and regular …
S Berchtold, B Ertl, DA Keim… - … Conference on Data …, 1998 - ieeexplore.ieee.org
Similarity search in multimedia databases requires an efficient support of nearest neighbor search on a large set of high dimensional points as a basic operation for query processing …
Smart factories, critical infrastructures, and medical devices largely rely on embedded systems that need to satisfy realtime constraints to complete crucial tasks. Recent studies …
The high degree of predictability in real-time systems makes it possible for adversaries to launch timing inference attacks such as those based on side-channels and covert-channels …
In this paper, we propose a covert threat model for MPSoCs designed using 3rd party Network-on-Chips (NoC). We illustrate that a malicious NoC can disrupt the availability of on …
F Akowuah, F Kong - 2021 IEEE 27th real-time and embedded …, 2021 - ieeexplore.ieee.org
Cyber-Physical Systems (CPS) tightly couple information technology with physical processes, which rises new vulnerabilities such as physical attacks that are beyond …