Privacy attack on IoT: a systematic literature review

LM Zagi, B Aziz - 2020 International Conference on ICT for …, 2020 - ieeexplore.ieee.org
Internet of Things (IoT) is a technology that is a daily necessity for humans. Unfortunately, so
far, the IoT still disables privacy for various reasons. This circumstance has intrigued many …

Data-driven anomaly detection with timing features for embedded systems

S Lu, R Lysecky - ACM Transactions on Design Automation of Electronic …, 2019 - dl.acm.org
Malware is a serious threat to network-connected embedded systems, as evidenced by the
continued and rapid growth of such devices, commonly referred to as the Internet of Things …

FIRE: A Finely Integrated Risk Evaluation Methodology for Life-Critical Embedded Systems

A Rao, NA Carreón, R Lysecky, J Rozenblit - Information, 2022 - mdpi.com
Life-critical embedded systems, including medical devices, are becoming increasingly
interconnected and interoperable, providing great efficiency to the healthcare ecosystem …

Probabilistic estimation of threat intrusion in embedded systems for runtime detection

NA Carreon, S Lu, R Lysecky - ACM Transactions on Embedded …, 2021 - dl.acm.org
With billions of networked connected embedded systems, the security historically provided
by the isolation of embedded systems is no longer sufficient. Millions of new malware are …

Resilient security of medical cyber-physical systems

A Rao, N Carreón, R Lysecky, J Rozenblit… - Database and Expert …, 2019 - Springer
Incorporating network connectivity in cyber-physical systems (CPSs) leads to advances
yielding better healthcare and quality of life for patients. However, such advances come with …

Hardware-based probabilistic threat detection and estimation for embedded systems

NA Carreon, S Lu, R Lysecky - 2018 IEEE 36th International …, 2018 - ieeexplore.ieee.org
With billions of networked connected embedded systems, the security historically provided
by the isolation of embedded systems is no longer sufficient. Both proactive security …

Runtime Verification and AI: Addressing Pragmatic Regulatory Challenges

C Colombo, G Pace, D Seychell - … on Bridging the Gap between AI and …, 2024 - Springer
The deployment of AI-driven solutions to increasingly complex tasks with real-world impact
raises various challenges in the area of verification. Using the case study of an AI-assisted …

Window-based statistical analysis of timing subcomponents for efficient detection of malware in life-critical systems

N Carreon, A Gilbreath… - 2019 Spring Simulation …, 2019 - ieeexplore.ieee.org
Securing life-critical embedded systems, particularly medical devices, requires both
proactive security measures that prevent intrusions and reactive measures that detect …

Gwad: Greedy workflow graph anomaly detection framework for system traces

W Setiawan, Y Thounaojam… - 2020 IEEE International …, 2020 - ieeexplore.ieee.org
System traces are a collection of time-stamped messages recorded by the operating system
while the system is running. Analysis of these traces is crucial for tasks such as system fault …

Anomaly Behaviour tracing of CHERI-RISC V using Hardware-Software Co-design

M Borowski, C Pal, S Saha, L Poli… - 2023 21st IEEE …, 2023 - ieeexplore.ieee.org
Capability Hardware Enhanced RISC Instructions (CHERI) is an extension of conventional
ISAs with capabilities enabling fine-grained memory protection. Recently, RISC-V ISA has …