Smart City Gnosys

Smart city article details

Title Mining Large Data To Create A Balanced Vulnerability Detection Dataset For Embedded Linux System
ID_Doc 37090
Authors Alqarni M.; Azim A.
Year 2022
Published Proceedings - 2022 IEEE/ACM 9th International Conference on Big Data Computing, Applications and Technologies, BDCAT 2022
DOI http://dx.doi.org/10.1109/BDCAT56447.2022.00018
Abstract The security of embedded systems is particularly crucial given the prevalence of embedded devices in daily life, business, and national defense. Firmware for embedded systems poses a serious threat to the safety of society, business, and the nation because of its robust concealment, difficulty in detection, and extended maintenance cycle. This technology is now an essential part of the contemporary experience, be it in the smart office, smart restaurant, smart home, or even the smart traffic system. Despite the fact that these systems are often fairly effective, the rapid expansion of embedded systems in smart cities have led to inconsistencies and misalignments between secured and unsecured systems, necessitating the development of secure, hacker-proof embedded systems. To solve this issue, we created a sizable, original, and objective dataset that is based on the latest Linux vulnerabilities for identifying the embedded system vulnerabilities and we modified a cutting-edge machine learning model for the Linux Kernel. The paper provides an updated EVDD and analysis of an extensive dataset for embedded system based vulnerability detection and also an updated state of the art deep learning model for embedded system vulnerability detection. We kept our dataset available for all researchers for future experiments and implementation. © 2022 IEEE.
Author Keywords Balanced Dataset; Cyber Security; Embedded System; Operating System; Secure Software; security mechanisms; Vulnerability Detection


Similar Articles


Id Similarity Authors Title Published
24966 View0.945Alqarni M.; Azim A.; Singh T.Evdd - A Novel Dataset For Embedded System Vulnerability Detection MechanismProceedings - 21st IEEE International Conference on Machine Learning and Applications, ICMLA 2022 (2022)
938 View0.852Podder D.; Sengupta Y.A Comprehensive Review On Embedded Systems Security Using Machine LearningEmbedded Artificial Intelligence: Real-Life Applications and Case Studies (2025)