This paper presents a unique security approach for detecting cyber-attacks against embedded systems (ESs). The proposed approach has been shaped within an architectural framework called anomalous resource consumption detection (ARCD). The approach’s detection mechanism detects cyber-attacks by distinguishing anomalous performance and resource consumption patterns from a pre-determinable reference model. The defense mechanism of this approach acts as an additional layer of protection for ESs. This technique’s effectiveness was previously evaluated statistically, and in this paper, we tested this approach’s efficiency computationally by using the support-vector machine algorithm. The datasets were generated and collected ...
International audienceThe design of an embedded system is built on a trade-off between its performan...
Embedded systems are spreading massively in critical infrastructures (industry 4.0, smart city, tran...
With billions of networked connected embedded systems, the security historically provided by the iso...
This paper presents a unique security approach for detecting cyber-attacks against embedded systems ...
This paper presents a novel security approach called Anomalous Resource Consumption Detection (ARCD)...
This thesis focuses on securing different attack surfaces of embedded systems while meeting the stri...
Embedded systems are widely used in critical situations and hence, are targets for malicious users....
Malware is a serious threat to network-connected embedded systems, as evidenced by the continued and...
It has been well recognized in the literature that intrusion detection in embedded computing systems...
Over the past decades, the major objectives of computer design have been to improve performance and ...
Malware detection still remains as one of the greatest challenges in computer security due to increa...
International audienceReal-time embedded systems (RTES) are required to interact more and more with ...
A new approach for detecting security attacks on real-time embedded applications by using ...
This paper proposes an approach for detecting compromised programs by analysing suitable features fr...
The current growth of the number of Embedded Systems (ES) and their use in sensitive systems attract...
International audienceThe design of an embedded system is built on a trade-off between its performan...
Embedded systems are spreading massively in critical infrastructures (industry 4.0, smart city, tran...
With billions of networked connected embedded systems, the security historically provided by the iso...
This paper presents a unique security approach for detecting cyber-attacks against embedded systems ...
This paper presents a novel security approach called Anomalous Resource Consumption Detection (ARCD)...
This thesis focuses on securing different attack surfaces of embedded systems while meeting the stri...
Embedded systems are widely used in critical situations and hence, are targets for malicious users....
Malware is a serious threat to network-connected embedded systems, as evidenced by the continued and...
It has been well recognized in the literature that intrusion detection in embedded computing systems...
Over the past decades, the major objectives of computer design have been to improve performance and ...
Malware detection still remains as one of the greatest challenges in computer security due to increa...
International audienceReal-time embedded systems (RTES) are required to interact more and more with ...
A new approach for detecting security attacks on real-time embedded applications by using ...
This paper proposes an approach for detecting compromised programs by analysing suitable features fr...
The current growth of the number of Embedded Systems (ES) and their use in sensitive systems attract...
International audienceThe design of an embedded system is built on a trade-off between its performan...
Embedded systems are spreading massively in critical infrastructures (industry 4.0, smart city, tran...
With billions of networked connected embedded systems, the security historically provided by the iso...