A survey of honeypots and honeynets for internet of things, industrial internet of things, and cyber-physical systems

J Franco, A Aris, B Canberk… - … Surveys & Tutorials, 2021 - ieeexplore.ieee.org
The Internet of Things (IoT), the Industrial Internet of Things (IIoT), and Cyber-Physical
Systems (CPS) have become essential for our daily lives in contexts such as our homes …

[HTML][HTML] Tools and Techniques for Collection and Analysis of Internet-of-Things malware: A systematic state-of-art review

S Madan, S Sofat, D Bansal - Journal of King Saud University-Computer …, 2022 - Elsevier
IoT devices which include wireless sensors, software, actuators, and computer devices
operated through the Internet, enable the transfer of data among objects or people …

[PDF][PDF] You Are What You Do: Hunting Stealthy Malware via Data Provenance Analysis.

Q Wang, WU Hassan, D Li, K Jee, X Yu, K Zou, J Rhee… - NDSS, 2020 - cs.virginia.edu
To subvert recent advances in perimeter and host security, the attacker community has
developed and employed various attack vectors to make a malware much stealthier than …

The Circle of life: A {large-scale} study of the {IoT} malware lifecycle

O Alrawi, C Lever, K Valakuzhy, K Snow… - 30th USENIX Security …, 2021 - usenix.org
Our current defenses against IoT malware may not be adequate to remediate an IoT
malware attack similar to the Mirai botnet. This work seeks to investigate this matter by …

Evading {Provenance-Based}{ML} detectors with adversarial system actions

K Mukherjee, J Wiedemeier, T Wang, J Wei… - 32nd USENIX Security …, 2023 - usenix.org
We present PROVNINJA, a framework designed to generate adversarial attacks that aim to
elude provenance-based Machine Learning (ML) security detectors. PROVNINJA is …

Survivalism: Systematic analysis of windows malware living-off-the-land

F Barr-Smith, X Ugarte-Pedrero… - … IEEE Symposium on …, 2021 - ieeexplore.ieee.org
As malware detection algorithms and methods become more sophisticated, malware
authors adopt equally sophisticated evasion mechanisms to defeat them. Anecdotal …

An insight into the machine-learning-based fileless malware detection

O Khalid, S Ullah, T Ahmad, S Saeed, DA Alabbad… - Sensors, 2023 - mdpi.com
In recent years, massive development in the malware industry changed the entire landscape
for malware development. Therefore, cybercriminals became more sophisticated by …

A survey on edge computing for wearable technology

X Jin, L Li, F Dang, X Chen, Y Liu - Digital Signal Processing, 2022 - Elsevier
Smart wearable devices have become more and more popular in our daily life due to their
unique power of “wearing-while-using.” However, requirements of light weight and compact …

A survey of cybersecurity of digital manufacturing

P Mahesh, A Tiwari, C Jin, PR Kumar… - Proceedings of the …, 2020 - ieeexplore.ieee.org
The Industry 4.0 concept promotes a digital manufacturing (DM) paradigm that can enhance
quality and productivity, which reduces inventory and the lead time for delivering custom …

{Plug-N-Pwned}: Comprehensive vulnerability analysis of {OBD-II} dongles as a new {Over-the-Air} attack surface in automotive {IoT}

H Wen, QA Chen, Z Lin - 29th USENIX security symposium (USENIX …, 2020 - usenix.org
With the growing trend of the Internet of Things, a large number of wireless OBD-II dongles
are developed, which can be simply plugged into vehicles to enable remote functions such …