Опубликована: Сен. 18, 2024
Язык: Английский
Опубликована: Сен. 18, 2024
Язык: Английский
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, Год журнала: 2024, Номер 43(11), С. 3455 - 3466
Опубликована: Ноя. 1, 2024
With the widespread use of Internet Things (IoT) devices, malware detection has become a hot spot for both academic and industrial communities. A series solutions based on system calls, logs, or hardware performance counters achieve promising results. However, such internal monitors are easily tampered with, especially against adaptive adversaries. In addition, existing log records typically exhibit substantial volume, resulting in data explosion problems. this article, we present TPE-Det, side-channel-based external monitor to cope with these issues. Specifically, TPE-Det leverages serial peripheral interface bus extract on-chip traces designs recovery pipeline operating logs. The advantages adversary-unperceived tamper-proof. restored logs mainly include file operation commands, which lightweight compared complete records. Meanwhile, deploy machine learning models respect statistical, sequence, graph features identify malware. Empirical evaluation shows that our proposal tamper-proof capability, high-detection accuracy, low-time/space overhead state-of-the-art methods.
Язык: Английский
Процитировано
1Health Informatics Journal, Год журнала: 2024, Номер 30(4)
Опубликована: Окт. 1, 2024
The Internet of Medical Things (IoMT) is transforming healthcare systems, but concerns about device integrity and sensitive data are growing. study aims to develop a framework for evaluating prioritizing schemes in IoT-based medical sensor devices, addressing the challenges selecting right authentication solution due its complexity intricacy.
Язык: Английский
Процитировано
0Internet of Things, Год журнала: 2024, Номер 29, С. 101462 - 101462
Опубликована: Дек. 11, 2024
Язык: Английский
Процитировано
0Journal of Network and Systems Management, Год журнала: 2024, Номер 33(1)
Опубликована: Дек. 28, 2024
In today's dynamic cybersecurity landscape, static and deterministic services orchestration which does not consider security as part of the process are proving insufficient against evolving threat landscape. Security must be an intrinsic processes. this regard, paper introduces innovative paradigm shift: Intent & AI-based Optimized Orchestration. On one hand, leveraging capabilities Intent-based solution, approach enables proactive reactive mitigation in next generation heterogenous environments computing continuum, abstracting homogenizing complexity underlying technologies. other a allocation that applies different techniques for selecting most suitable enforcement point (hardware/software) well deploying/configuring them, always considering properties during decision stages. Thus, solution allows organizations adaptively optimizing resource intent-based requirements. The implementation considers algorithms to perform depending on variety parameters. performance has been also provided validating proposed solution. results show combining orchestrator with Dynamic Allocation Engine improves efficiency making due ability dynamically choose algorithm is appropriate solve assignment problem best possible way shortest time.
Язык: Английский
Процитировано
0Опубликована: Сен. 18, 2024
Язык: Английский
Процитировано
0