S Madan, S Sofat, D Bansal - Journal of King Saud University-Computer …, 2022 - Elsevier
IoT devices which include wireless sensors, software, actuators, and computer devices operated through the Internet, enable the transfer of data among objects or people …
To subvert recent advances in perimeter and host security, the attacker community has developed and employed various attack vectors to make a malware much stealthier than …
Our current defenses against IoT malware may not be adequate to remediate an IoT malware attack similar to the Mirai botnet. This work seeks to investigate this matter by …
We present PROVNINJA, a framework designed to generate adversarial attacks that aim to elude provenance-based Machine Learning (ML) security detectors. PROVNINJA is …
As malware detection algorithms and methods become more sophisticated, malware authors adopt equally sophisticated evasion mechanisms to defeat them. Anecdotal …
In recent years, massive development in the malware industry changed the entire landscape for malware development. Therefore, cybercriminals became more sophisticated by …
Smart wearable devices have become more and more popular in our daily life due to their unique power of “wearing-while-using.” However, requirements of light weight and compact …
P Mahesh, A Tiwari, C Jin, PR Kumar… - Proceedings of the …, 2020 - ieeexplore.ieee.org
The Industry 4.0 concept promotes a digital manufacturing (DM) paradigm that can enhance quality and productivity, which reduces inventory and the lead time for delivering custom …
H Wen, QA Chen, Z Lin - 29th USENIX security symposium (USENIX …, 2020 - usenix.org
With the growing trend of the Internet of Things, a large number of wireless OBD-II dongles are developed, which can be simply plugged into vehicles to enable remote functions such …