Search Results - "Code Integrity"

Refine Results
  1. 1

    Detecting compromised IoT devices: Existing techniques, challenges, and a way forward by Makhdoom, Imran, Abolhasan, Mehran, Franklin, Daniel, Lipman, Justin, Zimmermann, Christian, Piccardi, Massimo, Shariati, Negin

    ISSN: 0167-4048, 1872-6208
    Published: Elsevier Ltd 01.09.2023
    Published in Computers & security (01.09.2023)
    “…IoT devices, whether connected to the Internet or operating in a private network, are vulnerable to cyber attacks from external or internal attackers or…”
    Get full text
    Journal Article
  2. 2

    A Theoretical Study of Hardware Performance Counters-Based Malware Detection by Basu, Kanad, Krishnamurthy, Prashanth, Khorrami, Farshad, Karri, Ramesh

    ISSN: 1556-6013, 1556-6021
    Published: New York IEEE 2020
    “…Malware can range from simple adware to stealthy kernel control-flow modifying rootkits. Although anti-virus software is popular, an ongoing cat-and-mouse…”
    Get full text
    Journal Article
  3. 3

    MAFIA: Protecting the Microarchitecture of Embedded Systems Against Fault Injection Attacks by Chamelot, Thomas, Courousse, Damien, Heydemann, Karine

    ISSN: 0278-0070, 1937-4151
    Published: New York IEEE 01.12.2023
    “…Fault injection attacks represent an effective threat to embedded systems. Recently, Laurent et al. have reported that fault injection attacks can leverage…”
    Get full text
    Journal Article
  4. 4

    Code Integrity and Confidentiality: An Active Data Approach for Active and Healthy Ageing by Litvinov, Egor, Llumiguano, Henry, Santofimia, Maria J., del Toro, Xavier, Villanueva, Felix J., Rocha, Pedro

    ISSN: 1424-8220, 1424-8220
    Published: Switzerland MDPI AG 16.05.2023
    Published in Sensors (Basel, Switzerland) (16.05.2023)
    “…Internet of Things cybersecurity is gaining attention as the number of devices installed in IoT environments is exponentially increasing while the number of…”
    Get full text
    Journal Article
  5. 5

    P2ISE: Preserving Project Integrity in CI/CD Based on Secure Elements by Muñoz, Antonio, Farao, Aristeidis, Correia, Jordy Ryan Casas, Xenakis, Christos

    ISSN: 2078-2489, 2078-2489
    Published: Basel MDPI AG 01.09.2021
    Published in Information (Basel) (01.09.2021)
    “…During the past decade, software development has evolved from a rigid, linear process to a highly automated and flexible one, thanks to the emergence of…”
    Get full text
    Journal Article
  6. 6

    Outlier: Enabling Effective Measurement of Hypervisor Code Integrity With Group Detection by Gu, Jianan, Ma, Yukun, Zheng, Beilei, Weng, Chuliang

    ISSN: 1545-5971, 1941-0018
    Published: Washington IEEE 01.11.2022
    “…Virtualization brings the benefits of utilization and scalability to the multi-tenant cloud platforms. However, the hypervisor, as one of the foundations in…”
    Get full text
    Journal Article
  7. 7

    A Secure Protocol for Remote-Code Integrity Attestation of Embedded Systems: The CSP Approach by Al-Wosabi, Abdo Ali A., Shukur, Zarina

    ISSN: 2169-3536, 2169-3536
    Published: Piscataway IEEE 2019
    Published in IEEE access (2019)
    “…No doubt, a person of modern society relying on Embedded Systems (ESs) has increased rapidly and the era of digital machines is gaining popularity among users…”
    Get full text
    Journal Article
  8. 8
  9. 9

    SCI-FI: Control Signal, Code, and Control Flow Integrity against Fault Injection Attacks by Chamelot, Thomas, Courousse, Damien, Heydemann, Karine

    ISSN: 1558-1101
    Published: EDAA 14.03.2022
    “…Fault injection attacks have become a serious threat against embedded systems. Recently, Laurent et al. have reported that some faults inside the…”
    Get full text
    Conference Proceeding
  10. 10

    DNAttest: Digital-twin-based Non-intrusive Attestation under Transient Uncertainty by Lin, Wei, Tan, Heng Chuan, Chen, Binbin, Zhang, Fan

    ISSN: 2158-3927
    Published: IEEE 01.06.2023
    “…Programmable logic controllers (PLCs) are vulnerable to malware, which is a key security risk for Industrial Control Systems (ICSs). Existing attestation…”
    Get full text
    Conference Proceeding
  11. 11

    Research Progress on Key Technologies of Multi-Cloud Storage by BAO Yuhan, FU Yinjin, CHEN Weiwei

    ISSN: 1000-3428
    Published: Editorial Office of Computer Engineering 01.10.2020
    Published in Ji suan ji gong cheng (01.10.2020)
    “…Traditional single-cloud storage leads to data security and service flexibility problems,such as data privacy leakage and difficulty in meeting the needs of…”
    Get full text
    Journal Article
  12. 12

    Advanced mobile agent security models for code integrity and malicious availability check by Venkatesan, S., Chellappan, C., Vengattaraman, T., Dhavachelvan, P., Vaish, Anurika

    ISSN: 1084-8045, 1095-8592
    Published: Elsevier Ltd 01.11.2010
    “…Mobile agent technology is an emerging paradigm in distributed computing environment and it holds a potential status in the relevant research field due to its…”
    Get full text
    Journal Article
  13. 13

    ModChecker: Kernel Module Integrity Checking in the Cloud Environment by Ahmed, Irfan, Zoranic, Aleksandar, Javaid, Salman, III, Golden G. Richard

    ISBN: 9781467325097, 1467325090
    ISSN: 0190-3918
    Published: IEEE 01.09.2012
    “…Kernel modules are an integral part of most operating systems (OS) as they provide flexible ways of adding new functionalities (such as file system or hardware…”
    Get full text
    Conference Proceeding
  14. 14

    Reinventing CI/CD for Collaborative Sciences: A Blockchain-Integrated Decentralized Middleware for Scalable and Fault-Tolerant Workflows by Farha, Amena Begum, Al-Mamun, Abdullah, Agrawal, Gagan, Aleroud, Ahmed

    ISSN: 2325-3703
    Published: IEEE 15.09.2025
    “…The expansion in the scale of collaborative scientific efforts has brought about numerous challenges in continuous integration/deployment (CI/CD). Current…”
    Get full text
    Conference Proceeding
  15. 15

    Ensuring Code Integrity in the Era of AI-Assisted Software Development by Pilone, Arthur

    ISSN: 2576-3148
    Published: IEEE 07.09.2025
    “…Generative artificial intelligence (GenAI) has taken software engineering by storm, as large language models (LLMs) have quickly come to generate large volumes…”
    Get full text
    Conference Proceeding
  16. 16

    Code Security Audit Based on Regulations at a Financial Institution by Olah, Istvan, Magyar, Sandor

    ISSN: 2765-818X
    Published: IEEE 19.05.2025
    “…IT systems are becoming increasingly essential in supporting business operations, especially within financial institutions, where their role is even more…”
    Get full text
    Conference Proceeding
  17. 17

    Poster: A Scalable and Fault-Tolerant Decentralized Middleware for CI/CD Workflow by Farha, Amena Begum, Al-Mamun, Abdullah, Agrawal, Gagan

    ISSN: 2995-066X
    Published: IEEE 03.06.2025
    “…The expansion of collaborative scientific efforts has introduced challenges in Continuous Integration/Deployment (CI/CD), due to the reliance on centralized…”
    Get full text
    Conference Proceeding
  18. 18

    Integrity of Code and IoT Validation of Resource Utilization in Micro Control Unit by Kushwaha, Ritesh Kumar, Ravikumar, Parimi Lvd, Mohammed, Muzammil H, Sasthi Kumar, C

    Published: IEEE 27.10.2023
    “…Cybersecurity for the Internet of Things is gaining more and more attention as the number of IoT devices has increased and the number of attack stargeting…”
    Get full text
    Conference Proceeding
  19. 19

    Implementation of Code Integrity Check Module for RISC-V Architecture with AES by Tulemez, Safak, Altilar, Deniz Turgay

    Published: IEEE 29.09.2022
    “…Embedded applications are commonly used in different fields. Different kinds vulnerabilities can occur in embedded systems because of various reasons such as…”
    Get full text
    Conference Proceeding
  20. 20

    Windows 10 security hardening using device guard whitelisting and Applocker blacklisting by Durve, Rohan, Bouridane, Ahmed

    ISSN: 2472-7601
    Published: IEEE 01.09.2017
    “…In the estimated 2.1 trillion enterprise of cyber-crime, 95% of threats are attributed to human errors. Most of these errors concern infected attachments or…”
    Get full text
    Conference Proceeding