Search Results - "Code Integrity"
-
1
Detecting compromised IoT devices: Existing techniques, challenges, and a way forward
ISSN: 0167-4048, 1872-6208Published: Elsevier Ltd 01.09.2023Published in Computers & security (01.09.2023)“…IoT devices, whether connected to the Internet or operating in a private network, are vulnerable to cyber attacks from external or internal attackers or…”
Get full text
Journal Article -
2
A Theoretical Study of Hardware Performance Counters-Based Malware Detection
ISSN: 1556-6013, 1556-6021Published: New York IEEE 2020Published in IEEE transactions on information forensics and security (2020)“…Malware can range from simple adware to stealthy kernel control-flow modifying rootkits. Although anti-virus software is popular, an ongoing cat-and-mouse…”
Get full text
Journal Article -
3
MAFIA: Protecting the Microarchitecture of Embedded Systems Against Fault Injection Attacks
ISSN: 0278-0070, 1937-4151Published: New York IEEE 01.12.2023Published in IEEE transactions on computer-aided design of integrated circuits and systems (01.12.2023)“…Fault injection attacks represent an effective threat to embedded systems. Recently, Laurent et al. have reported that fault injection attacks can leverage…”
Get full text
Journal Article -
4
Code Integrity and Confidentiality: An Active Data Approach for Active and Healthy Ageing
ISSN: 1424-8220, 1424-8220Published: Switzerland MDPI AG 16.05.2023Published in Sensors (Basel, Switzerland) (16.05.2023)“…Internet of Things cybersecurity is gaining attention as the number of devices installed in IoT environments is exponentially increasing while the number of…”
Get full text
Journal Article -
5
P2ISE: Preserving Project Integrity in CI/CD Based on Secure Elements
ISSN: 2078-2489, 2078-2489Published: Basel MDPI AG 01.09.2021Published in Information (Basel) (01.09.2021)“…During the past decade, software development has evolved from a rigid, linear process to a highly automated and flexible one, thanks to the emergence of…”
Get full text
Journal Article -
6
Outlier: Enabling Effective Measurement of Hypervisor Code Integrity With Group Detection
ISSN: 1545-5971, 1941-0018Published: Washington IEEE 01.11.2022Published in IEEE transactions on dependable and secure computing (01.11.2022)“…Virtualization brings the benefits of utilization and scalability to the multi-tenant cloud platforms. However, the hypervisor, as one of the foundations in…”
Get full text
Journal Article -
7
A Secure Protocol for Remote-Code Integrity Attestation of Embedded Systems: The CSP Approach
ISSN: 2169-3536, 2169-3536Published: Piscataway IEEE 2019Published in IEEE access (2019)“…No doubt, a person of modern society relying on Embedded Systems (ESs) has increased rapidly and the era of digital machines is gaining popularity among users…”
Get full text
Journal Article -
8
Code Integrity and Confidentiality: An Active Data Approach for Active and Healthy Ageing
ISSN: 1424-8220Published: MDPI AG 16.05.2023Published in Sensors (16.05.2023)Get full text
Journal Article -
9
SCI-FI: Control Signal, Code, and Control Flow Integrity against Fault Injection Attacks
ISSN: 1558-1101Published: EDAA 14.03.2022Published in Proceedings - Design, Automation, and Test in Europe Conference and Exhibition (14.03.2022)“…Fault injection attacks have become a serious threat against embedded systems. Recently, Laurent et al. have reported that some faults inside the…”
Get full text
Conference Proceeding -
10
DNAttest: Digital-twin-based Non-intrusive Attestation under Transient Uncertainty
ISSN: 2158-3927Published: IEEE 01.06.2023Published in Proceedings - International Conference on Dependable Systems and Networks (01.06.2023)“…Programmable logic controllers (PLCs) are vulnerable to malware, which is a key security risk for Industrial Control Systems (ICSs). Existing attestation…”
Get full text
Conference Proceeding -
11
Research Progress on Key Technologies of Multi-Cloud Storage
ISSN: 1000-3428Published: Editorial Office of Computer Engineering 01.10.2020Published in Ji suan ji gong cheng (01.10.2020)“…Traditional single-cloud storage leads to data security and service flexibility problems,such as data privacy leakage and difficulty in meeting the needs of…”
Get full text
Journal Article -
12
Advanced mobile agent security models for code integrity and malicious availability check
ISSN: 1084-8045, 1095-8592Published: Elsevier Ltd 01.11.2010Published in Journal of network and computer applications (01.11.2010)“…Mobile agent technology is an emerging paradigm in distributed computing environment and it holds a potential status in the relevant research field due to its…”
Get full text
Journal Article -
13
ModChecker: Kernel Module Integrity Checking in the Cloud Environment
ISBN: 9781467325097, 1467325090ISSN: 0190-3918Published: IEEE 01.09.2012Published in 2012 41st International Conference on Parallel Processing Workshops (01.09.2012)“…Kernel modules are an integral part of most operating systems (OS) as they provide flexible ways of adding new functionalities (such as file system or hardware…”
Get full text
Conference Proceeding -
14
Reinventing CI/CD for Collaborative Sciences: A Blockchain-Integrated Decentralized Middleware for Scalable and Fault-Tolerant Workflows
ISSN: 2325-3703Published: IEEE 15.09.2025Published in Proceedings (IEEE International Conference on e-Science. Online) (15.09.2025)“…The expansion in the scale of collaborative scientific efforts has brought about numerous challenges in continuous integration/deployment (CI/CD). Current…”
Get full text
Conference Proceeding -
15
Ensuring Code Integrity in the Era of AI-Assisted Software Development
ISSN: 2576-3148Published: IEEE 07.09.2025Published in Proceedings - Conference on Software Maintenance (1987) (07.09.2025)“…Generative artificial intelligence (GenAI) has taken software engineering by storm, as large language models (LLMs) have quickly come to generate large volumes…”
Get full text
Conference Proceeding -
16
Code Security Audit Based on Regulations at a Financial Institution
ISSN: 2765-818XPublished: IEEE 19.05.2025Published in SACI (International Symposium on Applied Computational Intelligence and Informatics. Online) (19.05.2025)“…IT systems are becoming increasingly essential in supporting business operations, especially within financial institutions, where their role is even more…”
Get full text
Conference Proceeding -
17
Poster: A Scalable and Fault-Tolerant Decentralized Middleware for CI/CD Workflow
ISSN: 2995-066XPublished: IEEE 03.06.2025Published in 2025 IEEE International Parallel and Distributed Processing Symposium Workshops (IPDPSW) (03.06.2025)“…The expansion of collaborative scientific efforts has introduced challenges in Continuous Integration/Deployment (CI/CD), due to the reliance on centralized…”
Get full text
Conference Proceeding -
18
Integrity of Code and IoT Validation of Resource Utilization in Micro Control Unit
Published: IEEE 27.10.2023Published in 2023 International Conference on New Frontiers in Communication, Automation, Management and Security (ICCAMS) (27.10.2023)“…Cybersecurity for the Internet of Things is gaining more and more attention as the number of IoT devices has increased and the number of attack stargeting…”
Get full text
Conference Proceeding -
19
Implementation of Code Integrity Check Module for RISC-V Architecture with AES
Published: IEEE 29.09.2022Published in 2022 International Conference on Theoretical and Applied Computer Science and Engineering (ICTASCE) (29.09.2022)“…Embedded applications are commonly used in different fields. Different kinds vulnerabilities can occur in embedded systems because of various reasons such as…”
Get full text
Conference Proceeding -
20
Windows 10 security hardening using device guard whitelisting and Applocker blacklisting
ISSN: 2472-7601Published: IEEE 01.09.2017Published in International Conference on Emerging Security Technologies (01.09.2017)“…In the estimated 2.1 trillion enterprise of cyber-crime, 95% of threats are attributed to human errors. Most of these errors concern infected attachments or…”
Get full text
Conference Proceeding

