A potential threat to embedded systems is the execution of unknown or malicious software capable of triggering harmful system behavior, aimed at theft of sensitive data or causing damage to the system. Commercial off-the-shelf embedded devices, such as embedded medical equipment, are more vulnerable as these type of products cannot be amended conventionally or have limited resources to implement protection mechanisms. In this paper, we present a self-organizing map (SOM)-based approach to enhance embedded system security by detecting abnormal program behavior. The proposed method extracts features derived from processor's program counter and cycles per instruction, and then utilises the features to identify abnormal behavior using the SOM. ...
Software has always been vulnerable to various vulnerably issues. Increasing the number of vulnerabi...
Embedded computing systems are very vulnerable to anomalies that can occur during execution of deplo...
Some argue that biologically inspired algorithms are the future of solving difficult problems in com...
A potential threat to embedded systems is the execution of unknown or malicious software capable of ...
A potential threat to embedded systems is the execution of unknown or malicious software capable of ...
Abstract — A potential threat to embedded systems is the execution of unknown or malicious software ...
Execution of unknown or malicious software on an embedded system may trigger harmful system behaviou...
This paper proposes an approach for detecting compromised programs by analysing suitable features fr...
This paper proposes an approach for detecting compromised programs by analysing suitable features fr...
This paper presents a system level framework for System-on-Chip (SoC) based embedded devices that ma...
In this paper, we introduce a novel mechanism that identifies abnormal system-wide behaviors using t...
Abstract — Security is emerging as an important concern in embedded system design. The security of e...
This paper presents experiments using Artificial Intelligence (AI) algorithms for online monitoring ...
In this paper, online system-level self-healing support is presented for embedded systems. Different...
With the rapid development of embedded systems, the systems’ security has become more and more impor...
Software has always been vulnerable to various vulnerably issues. Increasing the number of vulnerabi...
Embedded computing systems are very vulnerable to anomalies that can occur during execution of deplo...
Some argue that biologically inspired algorithms are the future of solving difficult problems in com...
A potential threat to embedded systems is the execution of unknown or malicious software capable of ...
A potential threat to embedded systems is the execution of unknown or malicious software capable of ...
Abstract — A potential threat to embedded systems is the execution of unknown or malicious software ...
Execution of unknown or malicious software on an embedded system may trigger harmful system behaviou...
This paper proposes an approach for detecting compromised programs by analysing suitable features fr...
This paper proposes an approach for detecting compromised programs by analysing suitable features fr...
This paper presents a system level framework for System-on-Chip (SoC) based embedded devices that ma...
In this paper, we introduce a novel mechanism that identifies abnormal system-wide behaviors using t...
Abstract — Security is emerging as an important concern in embedded system design. The security of e...
This paper presents experiments using Artificial Intelligence (AI) algorithms for online monitoring ...
In this paper, online system-level self-healing support is presented for embedded systems. Different...
With the rapid development of embedded systems, the systems’ security has become more and more impor...
Software has always been vulnerable to various vulnerably issues. Increasing the number of vulnerabi...
Embedded computing systems are very vulnerable to anomalies that can occur during execution of deplo...
Some argue that biologically inspired algorithms are the future of solving difficult problems in com...