Stealthy Information Leakage Through Peripheral Exploitation in Modern Embedded Systems
暂无分享,去创建一个
Michail Maniatakos | Anastasis Keliris | Dimitrios Tychalas | A. Keliris | Dimitrios Tychalas | Michail Maniatakos
[1] Michael Hamburg,et al. Spectre Attacks: Exploiting Speculative Execution , 2018, 2019 IEEE Symposium on Security and Privacy (SP).
[2] Manfred Pinkal,et al. Acoustic Side-Channel Attacks on Printers , 2010, USENIX Security Symposium.
[3] Michail Maniatakos,et al. The Cybersecurity Landscape in Industrial Control Systems , 2016, Proceedings of the IEEE.
[4] Adi Shamir,et al. Cache Attacks and Countermeasures: The Case of AES , 2006, CT-RSA.
[5] Mordechai Guri,et al. LED-it-GO: Leaking (A Lot of) Data from Air-Gapped Computers via the (Small) Hard Drive LED , 2017, DIMVA.
[6] Reinhold Weicker,et al. Dhrystone: a synthetic systems programming benchmark , 1984, CACM.
[7] Michail Maniatakos,et al. Open Platform Systems Under Scrutiny: A Cybersecurity Analysis of the Device Tree , 2018, 2018 25th IEEE International Conference on Electronics, Circuits and Systems (ICECS).
[8] Ralph Langner,et al. Stuxnet: Dissecting a Cyberwarfare Weapon , 2011, IEEE Security & Privacy.
[9] Michael Hamburg,et al. Meltdown , 2018, meltdownattack.com.
[10] William A. Arbaugh,et al. A secure and reliable bootstrap architecture , 1997, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097).
[11] Thomas Morris,et al. Trusted Platform Module , 2011, Encyclopedia of Cryptography and Security.
[12] Nils Ole Tippenhauer,et al. SWaT: a water treatment testbed for research and training on ICS security , 2016, 2016 International Workshop on Cyber-physical Systems for Smart Water Networks (CySWater).
[13] Georg Sigl,et al. Securing FPGA SoC configurations independent of their manufacturers , 2017, 2017 30th IEEE International System-on-Chip Conference (SOCC).
[14] Alberto Garcia-Serrano,et al. Anomaly Detection for malware identification using Hardware Performance Counters , 2015, ArXiv.
[15] Salvatore J. Stolfo,et al. When Firmware Modifications Attack: A Case Study of Embedded Exploitation , 2013, NDSS.