Identifying Internet of Things software activities using deep learning-based electromagnetic side-channel analysis
暂无分享,去创建一个
Nhien-An Le-Khac | Mark Scanlon | Luis Miralles-Pechuán | Asanka Sayakkara | Quan Le | M. Scanlon | A. Sayakkara | Luis Miralles-Pechuán | Quan Le | Nhien-An Le-Khac
[1] Isin Erer,et al. Realistic eavesdropping attacks on computer displays with low-cost and mobile receiver system , 2012, 2012 Proceedings of the 20th European Signal Processing Conference (EUSIPCO).
[2] Eric Peeters,et al. Power and electromagnetic analysis: Improved model, consequences and comparisons , 2007, Integr..
[3] Eric Blossom,et al. GNU radio: tools for exploring the radio frequency spectrum , 2004 .
[4] Nhien-An Le-Khac,et al. Cutting Through the Emissions: Feature Selection from Electromagnetic Side-Channel Data for Activity Detection , 2020, Digit. Investig..
[5] Dong Yu,et al. Deep Learning: Methods and Applications , 2014, Found. Trends Signal Process..
[6] Wojciech Samek,et al. Methods for interpreting and understanding deep neural networks , 2017, Digit. Signal Process..
[7] Baki Berkay Yilmaz,et al. Cell-Phone Classification: A Convolutional Neural Network Approach Exploiting Electromagnetic Emanations , 2020, ICASSP 2020 - 2020 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[8] Ibrahim M. Baggili,et al. Forensic State Acquisition from Internet of Things (FSAIoT): A general framework and practical approach for IoT forensics through IoT device state acquisition , 2017, ARES.
[9] Siva Sai Yerubandi,et al. Differential Power Analysis , 2002 .
[10] Leo Breiman,et al. Random Forests , 2001, Machine Learning.
[11] Nhien-An Le-Khac,et al. EMvidence: A Framework for Digital Evidence Acquisition from IoT Devices through Electromagnetic Side-Channel Analysis , 2020, Digit. Investig..
[12] Wim van Eck,et al. Electromagnetic radiation from video display units: An eavesdropping risk? , 1985, Comput. Secur..
[13] Horst Bischof,et al. Interactive Texture Segmentation using Random Forests and Total Variation , 2009, BMVC.
[14] Baki Berkay Yilmaz,et al. Detecting Cellphone Camera Status at Distance by Exploiting Electromagnetic Emanations , 2019, MILCOM 2019 - 2019 IEEE Military Communications Conference (MILCOM).
[15] Xinyu Yang,et al. A Survey on Internet of Things: Architecture, Enabling Technologies, Security and Privacy, and Applications , 2017, IEEE Internet of Things Journal.
[16] Thomas P. Hayes,et al. Screaming Channels: When Electromagnetic Side Channels Meet Radio Transceivers , 2018, CCS.
[17] Stephen Cass. A $40 software-defined radio [Resources_Hands On] , 2013, IEEE Spectrum.
[18] James Clerk Maxwell,et al. VIII. A dynamical theory of the electromagnetic field , 1865, Philosophical Transactions of the Royal Society of London.
[19] Milos Prvulovic,et al. EDDIE: EM-based detection of deviations in program execution , 2017, 2017 ACM/IEEE 44th Annual International Symposium on Computer Architecture (ISCA).
[20] Geoffrey E. Hinton,et al. Deep Learning , 2015, Nature.
[21] Nhien-An Le-Khac,et al. SoK: exploring the state of the art and the future potential of artificial intelligence in digital forensic investigation , 2020, ARES.
[22] María de Lourdes Martínez-Villaseñor,et al. A Flexible Approach for Human Activity Recognition Using Artificial Hydrocarbon Networks , 2016, Sensors.
[23] Choong Seon Hong,et al. Internet of things forensics: Recent advances, taxonomy, requirements, and open challenges , 2019, Future Gener. Comput. Syst..
[24] Jean-Michel Poggi,et al. Variable selection using random forests , 2010, Pattern Recognit. Lett..
[25] Saibal Mukhopadhyay,et al. Application Inference using Machine Learning based Side Channel Analysis , 2019, 2019 International Joint Conference on Neural Networks (IJCNN).
[26] Nhien-An Le-Khac,et al. A Survey of Electromagnetic Side-Channel Attacks and Discussion on their Case-Progressing Potential for Digital Forensics , 2019, Digit. Investig..
[27] Arthur L. Samuel,et al. Some Studies in Machine Learning Using the Game of Checkers , 1967, IBM J. Res. Dev..
[28] Nhien-An Le-Khac,et al. Facilitating Electromagnetic Side-Channel Analysis for IoT Investigation: Evaluating the EMvidence Framework , 2020, Digit. Investig..
[29] Ali Dehghantanha,et al. Digital forensics: the missing piece of the Internet of Things promise , 2016 .
[30] Nhien-An Le-Khac,et al. Electromagnetic side-channel attacks: potential for progressing hindered digital forensic analysis , 2018, ISSTA/ECOOP Workshops.
[31] Hermann Seuschek,et al. Side-Channel Attacks in the Internet of Things: Threats and Challenges , 2018 .
[32] Adi Shamir,et al. IoT Goes Nuclear: Creating a ZigBee Chain Reaction , 2017, 2017 IEEE Symposium on Security and Privacy (SP).
[33] Nhien-An Le-Khac,et al. Leveraging Electromagnetic Side-Channel Analysis for the Investigation of IoT Devices , 2019, Digit. Investig..