Computer Science: Faculty Publications
AI-Driven Penetration Testing for ARM Systems: Experimental Evaluation and Deployment Framework Across Four Paradigms
Document Type
Article
Publication Date
4-26-2026
Publication Title
IEEE Access
DOI
10.1109/ACCESS.2026.3687448
Abstract
ARM-based systems are widely deployed in edge and IoT settings, where penetration-testing tools must operate under strict memory, power, and thermal constraints, yet prior work offers limited deployment-oriented guidance for these platforms. We experimentally evaluated four AI paradigms—traditional machine learning (ML), deep learning (DL), large language models (LLMs), and reinforcement learning (RL)—across three ARM platform tiers (Raspberry Pi 5, Radxa ROCK 5B Plus, NVIDIA Jetson Nano), collecting over 8,000 measurements of accuracy, memory, latency, power, and thermal behavior. Traditional ML achieved up to 98.1% accuracy with 162 MB peak memory usage, while a combined optimization pipeline for DL (pruning, INT8 quantization-aware training, distillation, and platform tuning) achieved 92.6% accuracy with a 93% model-size reduction. In contrast, the evaluated LLM configurations exhibited memory and latency requirements that exceeded practical edge budgets on these devices, whereas RL supported lightweight on-device inference via off-device training, using 52–254 MB during execution. We introduce the ARM AI Security Benchmark (AASB) framework to standardize evaluation methodology and provide deployment-oriented baselines for ARM platforms.
Recommended Citation
Ragsdale, Matthew, Vijayalakshmi Ramasamy.
2026.
"AI-Driven Penetration Testing for ARM Systems: Experimental Evaluation and Deployment Framework Across Four Paradigms."
IEEE Access.
doi: 10.1109/ACCESS.2026.3687448 source: https://ieeexplore.ieee.org/document/11494651
https://digitalcommons.georgiasouthern.edu/compsci-facpubs/321
Copyright
This work is archived and distributed under the repository's Standard Copyright and Reuse License (opens in new tab). End users may copy, store, and distribute this work without restriction. For all other uses, permission must be obtained from the copyright owners or their authorized agents.