International audienceEnergy providers are massively deploying devices to manage distributed resources or equipment. These devices are used for example to manage the energy of smart factories efficiently or to monitor the infrastructure of smart-grids. By design, they typically exhibit homogeneous behavior, with similar software and hardware architecture. Unfortunately, these devices are also of interest to attackers aiming to develop botnets or compromise companies' security. This paper presents a new protection approach based on Hardware Performance Counters (HPC) to detect anomalies in massively deployed devices. These HPC are processed using outlier detection algorithms. Compared to existing solutions, we propose a lightweight approach ...
The daily use of mobile phones, and particularly smartphones, has become an integral part of modern ...
As technology scaling reaches nanometre scales,the error rate due to variations in temperature and v...
Control Hijacking Attack (CHA) is one of the significant ways to exploit the buffer related vulnerab...
International audienceEnergy providers are massively deploying devices to manage distributed resourc...
International audienceThe last recent years witnessed a massive and fast deployment of Internet of T...
Embedded systems suffer from reliability issues such as variations in temperature and voltage, singl...
National audienceToday, the deployment of the Internet of Things (IoT) technologies is growing in al...
Detection of malicious software (malware) has been a challenging issue over the past years due to th...
The analysis and correct categorisation of software performance anomalies is a major challenge in cu...
Critical infrastructures and associated real time Informational systems need some security protectio...
The usage of Internet of Things (IoT) devices has been exponentially increasing and their security i...
Code reuse techniques can circumvent existing security measures. For example, attacks such as Return...
Over the past decades, the major objectives of computer design have been to improve performance and ...
We present a kernel-level infrastructure that allows system-wide detection of malicious applications...
Software performance anomaly detection is a major challenge in complex industrial cyber-physical sys...
The daily use of mobile phones, and particularly smartphones, has become an integral part of modern ...
As technology scaling reaches nanometre scales,the error rate due to variations in temperature and v...
Control Hijacking Attack (CHA) is one of the significant ways to exploit the buffer related vulnerab...
International audienceEnergy providers are massively deploying devices to manage distributed resourc...
International audienceThe last recent years witnessed a massive and fast deployment of Internet of T...
Embedded systems suffer from reliability issues such as variations in temperature and voltage, singl...
National audienceToday, the deployment of the Internet of Things (IoT) technologies is growing in al...
Detection of malicious software (malware) has been a challenging issue over the past years due to th...
The analysis and correct categorisation of software performance anomalies is a major challenge in cu...
Critical infrastructures and associated real time Informational systems need some security protectio...
The usage of Internet of Things (IoT) devices has been exponentially increasing and their security i...
Code reuse techniques can circumvent existing security measures. For example, attacks such as Return...
Over the past decades, the major objectives of computer design have been to improve performance and ...
We present a kernel-level infrastructure that allows system-wide detection of malicious applications...
Software performance anomaly detection is a major challenge in complex industrial cyber-physical sys...
The daily use of mobile phones, and particularly smartphones, has become an integral part of modern ...
As technology scaling reaches nanometre scales,the error rate due to variations in temperature and v...
Control Hijacking Attack (CHA) is one of the significant ways to exploit the buffer related vulnerab...