Proceedings of the Second International Conference on Internet-of-Things Design and Implementation 2017
DOI: 10.1145/3054977.3057312
|View full text |Cite
|
Sign up to set email alerts
|

Detecting Abnormalities in IoT Program Executions through Control-Flow-Based Features

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(8 citation statements)
references
References 8 publications
0
5
0
Order By: Relevance
“…On top of that, it requires the addition of annotations to the smart meter software by its developers. The work of Agarwal et al [1] presents a concept for anomaly detection that uses context-sensitive features based on Ball-Larus path profiling. However, this approach requires the source code be instrumented, which facilitates the recording of function calls during execution.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…On top of that, it requires the addition of annotations to the smart meter software by its developers. The work of Agarwal et al [1] presents a concept for anomaly detection that uses context-sensitive features based on Ball-Larus path profiling. However, this approach requires the source code be instrumented, which facilitates the recording of function calls during execution.…”
Section: Discussionmentioning
confidence: 99%
“…Therefore, an attacker is able to find it using a custom scanner or any publicly available services such as Shodan. 1 The attacker is also capable to scan an IoT device in order to reveal open ports and identify running network services. Finally, we consider that an attacker is capable of exploiting a (potential zero-day) vulnerability on an IoT device through one of the network services running on the device.…”
Section: Attacker Modelmentioning
confidence: 99%
“…TrustLite envisions hardware-enforced isolation of software modules that provides trusted computing execution. Furthermore, Agarwal et al [2] proposed an approach that relies on context-sensitive features for improving the detection of abnormal programs executions. These techniques and S×C4IoT are not mutually exclusive and they can be federated for achieving a secure IoT framework.…”
Section: Malware Operating Within Contracts Boundariesmentioning
confidence: 99%
“…Many information technologies, such as cloud computing [37], artificial intelligence [38], [39], IoT [40], edge computing [41], [42] and service computing [43]- [45], are widely applied. A variety of devices with different configurations and functions are used in the IoT, edge computing, and service computing environment, and memory leak is a common vulnerability in programs running on devices with limited computing and storage capacity.…”
Section: Memory Leak Detection Algorithmmentioning
confidence: 99%