You are currently viewing a new version of our website. To view the old version click .

320 Results Found

  • Article
  • Open Access
3,487 Views
27 Pages

A Formal Verification Approach for Linux Kernel Designing

  • Zi Wang,
  • Yuqing Lan,
  • Xinlei He and
  • Jianghua Lv

Although the Linux kernel is widely used, its complexity makes errors common and potentially serious. Traditional formal verification methods often have high overhead and rely heavily on manual coding. They typically verify only specific functionalit...

  • Article
  • Open Access
5 Citations
4,243 Views
19 Pages

In the current era of prevailing information technology, the requirement for high availability and reliability of various types of services is critical. This paper focusses on the comparison and analysis of different high-availability solutions for L...

  • Article
  • Open Access
14 Citations
10,990 Views
18 Pages

This research performs real-time measurements of Linux kernels with real-time support provided by the PREEMPT_RT patch on embedded development devices such as BeagleBoard and Raspberry Pi. The experimental measurements of the Linux real-time performa...

  • Article
  • Open Access
9 Citations
10,176 Views
17 Pages

Low Cost Multisensor Kinematic Positioning and Navigation System with Linux/RTAI

  • Kun Qian Qian,
  • Jianguo Wang,
  • Nilesh S. Gopaul and
  • Baoxin Hu

28 September 2012

Despite its popularity, the development of an embedded real-time multisensor kinematic positioning and navigation system discourages many researchers and developers due to its complicated hardware environment setup and time consuming device driver de...

  • Feature Paper
  • Article
  • Open Access
3 Citations
3,073 Views
19 Pages

A Novel Static Analysis Approach Using System Calls for Linux IoT Malware Detection

  • Jayanthi Ramamoorthy,
  • Khushi Gupta,
  • Ram C. Kafle,
  • Narasimha K. Shashidhar and
  • Cihan Varol

The proliferation of Internet of Things (IoT) devices on Linux platforms has heightened concerns regarding vulnerability to malware attacks. This paper introduces a novel approach to investigating the behavior of Linux IoT malware by examining syscal...

  • Article
  • Open Access
2 Citations
2,884 Views
24 Pages

Assessing the Cloud-RAN in the Linux Kernel: Sharing Computing and Network Resources

  • Andres F. Ocampo,
  • Mah-Rukh Fida,
  • Ahmed Elmokashfi and
  • Haakon Bryhni

8 April 2024

Cloud-based Radio Access Network (Cloud-RAN) leverages virtualization to enable the coexistence of multiple virtual Base Band Units (vBBUs) with collocated workloads on a single edge computer, aiming for economic and operational efficiency. However,...

  • Article
  • Open Access
440 Views
21 Pages

19 November 2025

Accurately evaluating multi-core embedded systems remains a major challenge, as existing benchmarking methods and tools fail to reproduce realistic workloads with inter-core contentions. This study introduces a benchmark framework for Linux-based emb...

  • Feature Paper
  • Article
  • Open Access
1 Citations
2,338 Views
27 Pages

30 March 2023

Monitoring the evolution of the state of networks is an important issue to ensure that many applications provide the required quality of service. The first step in network-monitoring systems consists of capturing packets; that is, packets arrive at t...

  • Article
  • Open Access
5 Citations
2,275 Views
17 Pages

Response Times Reconstructor Based on Mathematical Expectation Quotient for a High Priority Task over RT-Linux

  • Diana L. González-Baldovinos,
  • Pedro Guevara-López,
  • Jose Luis Cano-Rosas,
  • Jorge Salvador Valdez-Martínez and
  • Asdrúbal López-Chau

2 January 2022

Every computer task generates response times depending on the computer hardware and software. The response times of tasks executed in real-time operating systems such as RT-Linux can vary as their instances evolve even though they always execute the...

  • Article
  • Open Access
22 Citations
9,654 Views
27 Pages

Use of Low-Cost Acquisition Systems with an Embedded Linux Device for Volcanic Monitoring

  • David Moure,
  • Pedro Torres,
  • Benito Casas,
  • Daniel Toma,
  • María José Blanco,
  • Joaquín Del Río and
  • Antoni Manuel

19 August 2015

This paper describes the development of a low-cost multiparameter acquisition system for volcanic monitoring that is applicable to gravimetry and geodesy, as well as to the visual monitoring of volcanic activity. The acquisition system was developed...

  • Article
  • Open Access
3,202 Views
16 Pages

25 September 2024

The surge in big data and analytics has catalysed the proliferation of cybercrime, largely driven by organisations’ intensified focus on gathering and processing personal data for profit while often overlooking security considerations. Hadoop a...

  • Article
  • Open Access
2,959 Views
21 Pages

20 February 2023

Since deep space exploration tasks, such as space gravitational wave detection, put forward increasingly higher requirements for the satellite platform, the scale and complexity of the satellite management unit (SMU) software are also increasing, and...

  • Article
  • Open Access
2 Citations
3,716 Views
23 Pages

Weaponized IoT: A Comprehensive Comparative Forensic Analysis of Hacker Raspberry Pi and PC Kali Linux Machine

  • Mohamed Chahine Ghanem,
  • Eduardo Almeida Palmieri,
  • Wiktor Sowinski-Mydlarz,
  • Sahar Al-Sudani and
  • Dipo Dunsin

7 March 2025

The proliferation of Internet of Things (IoT) devices presents significant challenges for cybersecurity and digital forensics, particularly as these devices have become increasingly weaponised for malicious activities. This research focuses on the fo...

  • Article
  • Open Access
1 Citations
1,672 Views
18 Pages

In this paper, we propose a Linux-based operating system, namely, DicomOS, tailored for medical imaging and enhanced interoperability, addressing user-friendly functionality and the main critical needs in radiology workflows. Traditional operating sy...

  • Article
  • Open Access
20 Citations
9,598 Views
28 Pages

This work investigates the real-time performance of Linux kernels and distributions with a PREEMPT_RT real-time patch on ARM-based embedded devices. Experimental measurements, which are mainly based on heuristic methods, provide novel insights into L...

  • Proceeding Paper
  • Open Access
768 Views
13 Pages

Fortifying Linux Server and Implementing a Zero Trust Network Access (ZTNA) for Enhanced Security

  • Syed Hasnat Ansar,
  • Arslan Sadiq,
  • Uswa Ihsan,
  • Humaira Ashraf and
  • Somantri

19 September 2025

For organizations, protecting computer networks has always been a very tough and demanding task. In the current technological era digital resources can now be protected without the need for outdated traditional perimeter-based security techniques. Or...

  • Article
  • Open Access
6 Citations
6,958 Views
11 Pages

Time Sensitive Networking Protocol Implementation for Linux End Equipment

  • Jesús Lázaro,
  • Jimena Cabrejas,
  • Aitzol Zuloaga,
  • Leire Muguira and
  • Jaime Jiménez

By bringing industrial-grade robustness and reliability to Ethernet, Time Sensitive Networking (TSN) offers an IEEE standard communication technology that enables interoperability between standard-conformant industrial devices from any vendor. It als...

  • Feature Paper
  • Article
  • Open Access
25 Citations
6,570 Views
18 Pages

Most cyberattacks use malicious codes, and according to AV-TEST, more than 1 billion malicious codes are expected to emerge in 2020. Although such malicious codes have been widely seen around the PC environment, they have been on the rise recently, f...

  • Article
  • Open Access
1,401 Views
23 Pages

Fuzz testing plays a key role in improving Linux kernel security, but large-scale fuzzing often generates a high number of crash reports, many of which are redundant. These duplicated reports burden triage efforts and delay the identification of trul...

  • Article
  • Open Access
5 Citations
2,827 Views
18 Pages

Linux IoT Malware Variant Classification Using Binary Lifting and Opcode Entropy

  • Jayanthi Ramamoorthy,
  • Khushi Gupta,
  • Narasimha K. Shashidhar and
  • Cihan Varol

Binary function analysis is fundamental in understanding the behavior and genealogy of malware. The detection, classification, and analysis of Linux IoT malware and its variants present significant challenges due to the wide range of architectures su...

  • Feature Paper
  • Article
  • Open Access
6 Citations
5,839 Views
14 Pages

The merger of SCADA (supervisory control and data acquisition) and IoTs (internet of things) technologies allows end-users to monitor and control industrial components remotely. However, this transformation opens up a new set of attack vectors and un...

  • Article
  • Open Access
2 Citations
4,980 Views
21 Pages

Enhancing Linux System Security: A Kernel-Based Approach to Fileless Malware Detection and Mitigation

  • Min-Hao Wu,
  • Fu-Hau Hsu,
  • Jian-Hung Huang,
  • Keyuan Wang,
  • Yan-Ling Hwang,
  • Hao-Jyun Wang,
  • Jian-Xin Chen,
  • Teng-Chuan Hsiao and
  • Hao-Tsung Yang

8 September 2024

In the late 20th century, computer viruses emerged as powerful malware that resides permanently in target hosts. For a virus to function, it must load into memory from persistent storage, such as a file on a hard drive. Due to the significant destruc...

  • Article
  • Open Access
1,735 Views
20 Pages

JITScanner: Just-in-Time Executable Page Check in the Linux Operating System

  • Pasquale Caporaso,
  • Giuseppe Bianchi and
  • Francesco Quaglia

26 February 2024

Modern malware poses a severe threat to cybersecurity, continually evolving in sophistication. To combat this threat, researchers and security professionals continuously explore advanced techniques for malware detection and analysis. Dynamic analysis...

  • Article
  • Open Access
7 Citations
4,669 Views
19 Pages

8 October 2022

Due to recent developments in IT technology, various IoT devices have been developed for use in various environments, such as card smart TVs, and smartphones Communication between IoT devices has become possible. Various IoT devices are found in home...

  • Article
  • Open Access
1 Citations
2,962 Views
18 Pages

Nanovised Control Flow Attestation

  • Raz Ben Yehuda,
  • Michael Kiperberg and
  • Nezer Jacob Zaidenberg

4 March 2022

This paper presents an improvement of control flow attestation (C-FLAT) for Linux. C-FLAT is a control attestation system for embedded devices. It was implemented as a software executing in ARM’s TrustZone on bare-metal devices. We extend the d...

  • Article
  • Open Access
3 Citations
3,151 Views
23 Pages

This work demonstrates the feasibility of using Kali Linux in the process of power electronic device research. The novelty in this work is the use of Kali Linux in the process of power electronic device research. This operating system is mainly used...

  • Article
  • Open Access
2 Citations
2,452 Views
22 Pages

15 May 2023

The Integrity Measurement Architecture subsystem on the Linux platform is a critical security component in the kernel to ensure the integrity of the running system. However, the default Integrity Measurement Architecture policy mechanisms based on op...

  • Article
  • Open Access
497 Views
20 Pages

This study addresses the problem of automatic attack detection targeting Linux-based machines and web applications through the analysis of system logs, with a particular focus on reducing the computational requirements of existing solutions. The aim...

  • Article
  • Open Access
2 Citations
2,636 Views
15 Pages

Although Three-dimensional (3D) printers have legitimate applications in various fields, they also present opportunities for misuse by criminals who can infringe upon intellectual property rights, manufacture counterfeit medical products, or create u...

  • Article
  • Open Access
6 Citations
4,303 Views
17 Pages

Enhancing the Isolation and Performance of Control Planes for Fog Computing

  • Kyungwoon Lee,
  • Chiyoung Lee,
  • Cheol-Ho Hong and
  • Chuck Yoo

28 September 2018

Fog computing, which places computing resources close to IoT devices, can offer low latency data processing for IoT applications. With software-defined networking (SDN), fog computing can enable network control logics to become programmable and run o...

  • Article
  • Open Access
5 Citations
2,486 Views
27 Pages

Beat the Heat: Syscall Attack Detection via Thermal Side Channel

  • Teodora Vasilas,
  • Claudiu Bacila and
  • Remus Brad

21 August 2024

As the complexity and integration of electronic devices increase, understanding and mitigating side-channel vulnerabilities will remain a critical area of cybersecurity research. The new and intriguing software-based thermal side-channel attacks and...

  • Article
  • Open Access
3 Citations
3,745 Views
15 Pages

Implementation of a Piezo-diagnostics Approach for Damage Detection Based on PCA in a Linux-Based Embedded Platform

  • Jhonatan Camacho,
  • Andrés Quintero,
  • Magda Ruiz,
  • Rodolfo Villamizar and
  • Luis Mujica

1 November 2018

The implementation of damage-detection methods for continuously assessing structural integrity entails systems with attractive features such as storage capabilities, memory capacity, computational complexity and time-consuming processing. In this sen...

  • Article
  • Open Access
856 Views
21 Pages

MAFUZZ: Adaptive Gradient-Guided Fuzz Testing for Satellite Internet Ground Terminals

  • Ang Cao,
  • Yongli Zhao,
  • Xiaodan Yan,
  • Wei Wang,
  • Jian Yang,
  • Yuanjian Zhang and
  • Ruiqi Liu

With the proliferation of satellite internet systems, such as Starlink and OneWeb, ground terminals have become critical for ensuring end-user connectivity. However, the security of Satellite Internet Ground Terminals (SIGTs) remains underexplored. T...

  • Article
  • Open Access
3,510 Views
16 Pages

Open-Source FPGA Implementation of an I3C Controller

  • Jorge André Gastmaier Marques,
  • Sergiu Arpadi and
  • Maximiliam Luppe

27 January 2025

Multiple serial interfaces have emerged to meet system requirements across devices, ranging from slower-speed buses, such as I2C, to high throughput serial interfaces, like JESD204. To address the need for a medium-speed protocol and to resolve I2C s...

  • Article
  • Open Access
24 Citations
15,533 Views
15 Pages

5 September 2008

Embedded systems are playing an increasingly important role in control engineering. Despite their popularity, embedded systems are generally subject to resource constraints and it is therefore difficult to build complex control systems on embedded pl...

  • Article
  • Open Access
5 Citations
3,340 Views
22 Pages

14 July 2021

NUMA multi-core systems divide system resources into several nodes. When an imbalance in the load between cores occurs, the kernel scheduler’s load balancing mechanism then migrates threads between cores or across NUMA nodes. Remote memory access is...

  • Article
  • Open Access
9 Citations
7,097 Views
14 Pages

13 March 2017

Over the past decade, several security issues with Linux Random Number Generator (LRNG) on PCs and Androids have emerged. The main problem involves the process of entropy harvesting, particularly at boot time. An entropy source in the input pool of L...

  • Article
  • Open Access
13 Citations
6,004 Views
18 Pages

11 February 2024

RISC-V offers a modular technical approach combined with an open, royalty-free instruction set architecture (ISA). However, despite its advantages as a fundamental building block for many embedded systems, the escalating complexity and functional dem...

  • Article
  • Open Access
1 Citations
5,186 Views
13 Pages

Distributed One Time Password Infrastructure for Linux Environments

  • Alberto Benito Peral,
  • Ana Lucila Sandoval Orozco,
  • Luis Javier García Villalba and
  • Tai-Hoon Kim

26 April 2018

Nowadays, there is a lot of critical information and services hosted on computer systems. The proper access control to these resources is essential to avoid malicious actions that could cause huge losses to home and professional users. The access con...

  • Article
  • Open Access
2 Citations
3,460 Views
9 Pages

KARAJ: An Efficient Adaptive Multi-Processor Tool to Streamline Genomic and Transcriptomic Sequence Data Acquisition

  • Mahdieh Labani,
  • Amin Beheshti,
  • Nigel H. Lovell,
  • Hamid Alinejad-Rokny and
  • Ali Afrasiabi

20 November 2022

Here we developed KARAJ, a fast and flexible Linux command-line tool to automate the end-to-end process of querying and downloading a wide range of genomic and transcriptomic sequence data types. The input to KARAJ is a list of PMCIDs or publication...

  • Article
  • Open Access
2 Citations
3,628 Views
18 Pages

CCALK: (When) CVA6 Cache Associativity Leaks the Key

  • Valentin Martinoli,
  • Elouan Tourneur,
  • Yannick Teglia and
  • Régis Leveugle

In this work, we study an end-to-end implementation of a Prime + Probe covert channel on the CVA6 RISC-V processor implemented on a FPGA target and running a Linux OS. We develop the building blocks of the covert channel and provide a detailed view o...

  • Article
  • Open Access
3 Citations
1,851 Views
23 Pages

26 January 2023

The evolution of commodity hardware makes it possible to use this type of equipment to implement traffic monitoring systems. A preliminary empirical evaluation of a network traffic probe based on Linux indicates that the system performance has signif...

  • Article
  • Open Access
8 Citations
7,443 Views
19 Pages

Run-Time Adaptive In-Kernel BPF/XDP Solution for 5G UPF

  • Thiago A. Navarro do Amaral,
  • Raphael V. Rosa,
  • David F. Cruz Moura and
  • Christian Esteve Rothenberg

Flexibility is considered a key feature of 5G softwarization to deliver a timely response to changes in network requirements that may be caused by traffic variation, user mobility, dynamic network function chains, slice lifecycle management operation...

  • Article
  • Open Access
2 Citations
2,926 Views
17 Pages

Container platforms ease the deployment of applications and respond to failures. The advantages of container platforms have promoted their use in information services. However, the use of container platforms is accompanied by associated security risk...

  • Article
  • Open Access
1 Citations
4,350 Views
17 Pages

TCP Acknowledgment Optimization in Low Power and Embedded Devices

  • Arūnas Statkus,
  • Šarūnas Paulikas and
  • Audrius Krukonis

Paper investigates transport control protocol (TCP) acknowledgment (ACK) optimization in low power or embedded devices to improve their performance on high-speed links by limiting the ACK rate. Today the dominant protocol for interconnecting network...

  • Article
  • Open Access
13 Citations
9,506 Views
19 Pages

Embedded ARM System for Volcano Monitoring in Remote Areas: Application to the Active Volcano on Deception Island (Antarctica)

  • Luis Miguel Peci,
  • Manuel Berrocoso,
  • Alberto Fernández-Ros,
  • Alicia García,
  • José Manuel Marrero and
  • Ramón Ortiz

2 January 2014

This paper describes the development of a multi-parameter system for monitoring volcanic activity. The system permits the remote access and the connection of several modules in a network. An embedded ARMTM processor has been used, allowing a great fl...

  • Article
  • Open Access
1,074 Views
21 Pages

In today’s era of technology, where information is readily available anytime and from anywhere, safeguarding our privacy and sensitive data is more important than ever. The thermal sensors embedded within a CPU are primarily utilized for monito...

  • Article
  • Open Access
6 Citations
4,626 Views
13 Pages

To address the issues of low bandwidth, weak real-time performance, and poor synchronization in traditional fieldbuses for multi-axis motion control, a solution for the implementation of an EtherCAT master based on the IgH EtherCAT Master open-source...

  • Article
  • Open Access
1,472 Views
14 Pages

The flash translation layer (FTL) in SSDs introduces logical-to-physical address mapping, but this mapping alters data layout, leading to performance degradation. This issue is particularly evident in the Linux swap subsystem. While SSDs offer higher...

of 7