A survey on machine-learning based security design for cyber-physical systems

S Kim, KJ Park - Applied Sciences, 2021 - mdpi.com
A cyber-physical system (CPS) is the integration of a physical system into the real world and
control applications in a computing system, interacting through a communications network …

SoK: Security in real-time systems

M Hasan, A Kashinath, CY Chen, S Mohan - ACM Computing Surveys, 2024 - dl.acm.org
Security is an increasing concern for real-time systems (RTS). Over the last decade or so,
researchers have demonstrated attacks and defenses aimed at such systems. In this article …

All eyes on you: Distributed Multi-Dimensional IoT microservice anomaly detection

MO Pahl, FX Aubet - 2018 14th International Conference on …, 2018 - ieeexplore.ieee.org
The Internet of Things (IoT) is a Distributed System of cooperating Microservices (μSs). IoT
services manage devices that monitor and control their environments. The interaction of the …

Orpheus: Enforcing cyber-physical execution semantics to defend against data-oriented attacks

L Cheng, K Tian, D Yao - Proceedings of the 33rd Annual Computer …, 2017 - dl.acm.org
Recent studies have revealed that control programs running on embedded devices suffer
from both control-oriented attacks (eg, code-injection or code-reuse attacks) and data …

Lightweight collaborative anomaly detection for the IoT using blockchain

Y Mirsky, T Golomb, Y Elovici - Journal of Parallel and Distributed …, 2020 - Elsevier
Due to their rapid growth and deployment, the Internet of things (IoT) have become a central
aspect of our daily lives. Unfortunately, IoT devices tend to have many vulnerabilities which …

HADES-IoT: A practical host-based anomaly detection system for IoT devices

D Breitenbacher, I Homoliak, YL Aung… - Proceedings of the …, 2019 - dl.acm.org
Internet of Things (IoT) devices have become ubiquitous and spread across many
application domains including the industry, transportation, healthcare, and households …

Realswatt: Remote software-based attestation for embedded devices under realtime constraints

S Surminski, C Niesler, F Brasser, L Davi… - Proceedings of the …, 2021 - dl.acm.org
Smart factories, critical infrastructures, and medical devices largely rely on embedded
systems that need to satisfy realtime constraints to complete crucial tasks. Recent studies …

[图书][B] Anomaly detection as a service: challenges, advances, and opportunities

Anomaly detection has been a long-standing security approach with versatile applications,
ranging from securing server programs in critical environments, to detecting insider threats …

HADES-IoT: A practical and effective host-based anomaly detection system for IoT devices (extended version)

D Breitenbacher, I Homoliak, YL Aung… - IEEE Internet of …, 2021 - ieeexplore.ieee.org
Internet of Things (IoT) devices have become ubiquitous, with applications in many domains,
including industry, transportation, and healthcare; these devices also have many household …

Securing real-time internet-of-things

CY Chen, M Hasan, S Mohan - Sensors, 2018 - mdpi.com
Modern embedded and cyber-physical systems are ubiquitous. Many critical cyber-physical
systems have real-time requirements (eg, avionics, automobiles, power grids, manufacturing …