Security and privacy in the emerging cyber-physical world: A survey

Z Yu, Z Kaplan, Q Yan, N Zhang - … Communications Surveys & …, 2021 - ieeexplore.ieee.org
With the emergence of low-cost smart and connected IoT devices, the area of cyber-physical
security is becoming increasingly important. Past research has demonstrated new threat …

Intel software guard extensions applications: A survey

NC Will, CA Maziero - ACM Computing Surveys, 2023 - dl.acm.org
Data confidentiality is a central concern in modern computer systems and services, as
sensitive data from users and companies are being increasingly delegated to such systems …

Digital forensics and cyber forensics investigation: security challenges, limitations, open issues, and future direction

AA Khan, AA Shaikh, AA Laghari… - International …, 2022 - inderscienceonline.com
Digital forensics (DF) is the scientific investigation of digital criminal activities, illegal
attempts, and cyber-attacks through computer systems. It is becoming a crucial aspect of law …

A multi-dimensional machine learning approach to predict advanced malware

Ş Bahtiyar, MB Yaman, CY Altıniğne - Computer networks, 2019 - Elsevier
The growth of cyber-attacks that are carried out with malware have become more
sophisticated on almost all networks. Furthermore, attacks with advanced malware have the …

TKRD: Trusted kernel rootkit detection for cybersecurity of VMs based on machine learning and memory forensic analysis

X Wang, J Zhang, A Zhang… - Mathematical Biosciences …, 2019 - strathprints.strath.ac.uk
The promotion of cloud computing makes the virtual machine (VM) increasingly a target of
malware attacks in cybersecurity such as those by kernel rootkits. Memory forensic, which …

Polyrhythm: Adaptive tuning of a multi-channel attack template for timing interference

A Li, M Sudvarg, H Liu, Z Yu, C Gill… - 2022 IEEE Real-Time …, 2022 - ieeexplore.ieee.org
As cyber-physical systems have become increasingly complex, rising computational
demand has led to the ubiquitous use of multicore processors in embedded environments …

A novel principle to validate digital forensic models

D Mothi, H Janicke, I Wagner - Forensic Science International: Digital …, 2020 - Elsevier
Digital forensic models (DFMs) form the base for any digital investigation because they
guide the investigators with necessary steps and procedures to be taken during the …

Abusing trust: Mobile kernel subversion via trustzone rootkits

D Marth, C Hlauschek, C Schanes… - 2022 IEEE Security …, 2022 - ieeexplore.ieee.org
The Arm TrustZone is the de facto standard for hardware-backed Trusted Execution
Environments (TEEs) on mobile devices, providing isolation for secure computations to be …

Decrypting live SSH traffic in virtual environments

P McLaren, G Russell, WJ Buchanan, Z Tan - Digital Investigation, 2019 - Elsevier
Decrypting and inspecting encrypted malicious communications may assist crime detection
and prevention. Access to client or server memory enables the discovery of artefacts …

Work-in-progress: Measuring security protection in real-time embedded firmware

Y Wu, Y Wang, S Zhai, Z Li, A Li… - 2022 IEEE Real-Time …, 2022 - ieeexplore.ieee.org
The proliferation of real-time cyber-physical systems (CPS) is making profound changes to
our daily life. Many real-time CPSs are security and safety-critical because of their …