2022
DOI: 10.1109/tetc.2021.3082525
|View full text |Cite
|
Sign up to set email alerts
|

GRAVITAS: Graphical Reticulated Attack Vectors for Internet-of-Things Aggregate Security

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
4
4
2

Relationship

1
9

Authors

Journals

citations
Cited by 12 publications
(5 citation statements)
references
References 23 publications
0
5
0
Order By: Relevance
“…Although the naive method is much more lightweight than series models, it has two drawbacks that limit its applicability in real-world scenarios. First, the naive pattern matching approach cannot detect semantically-similar instruction calls [13]. As a result, the attacker may avoid detection by executing different APIs with the same functionality as the instruction in the signature.…”
Section: Series Checkermentioning
confidence: 99%
“…Although the naive method is much more lightweight than series models, it has two drawbacks that limit its applicability in real-world scenarios. First, the naive pattern matching approach cannot detect semantically-similar instruction calls [13]. As a result, the attacker may avoid detection by executing different APIs with the same functionality as the instruction in the signature.…”
Section: Series Checkermentioning
confidence: 99%
“…We target this problem in this article. ML-based attack graphs have been used previously to analyze the security of IoT and cyber-physical systems [6,15]. We use ML on the attack graphs to enable our framework to scale to larger networks.…”
Section: Related Workmentioning
confidence: 99%
“…It is an important challenge to detect DeepFakes in realtime to restore faith in digital media. Machine learning has found applications in various domains of cybersecurity like network security [9], security of internet-ofthings [8,2,10], and anomaly detection [6]. A myriad of approaches from signal processing, graphics and computer vision have been combined in the attempt to detect Deep-Fakes.…”
Section: Introductionmentioning
confidence: 99%