Malicious Activity Detection in Lightweight Wearable and IoT Devices Using Signal Stitching
暂无分享,去创建一个
[1] Salvatore J. Stolfo,et al. When Firmware Modifications Attack: A Case Study of Embedded Exploitation , 2013, NDSS.
[2] Hyung Gyu Lee,et al. Energy-Optimal Gesture Recognition using Self-Powered Wearable Devices , 2018, 2018 IEEE Biomedical Circuits and Systems Conference (BioCAS).
[3] Maire O'Neill,et al. Insecurity by Design: Today's IoT Device Security Problem , 2016 .
[4] Ahmad-Reza Sadeghi,et al. Security and privacy challenges in industrial Internet of Things , 2015, 2015 52nd ACM/EDAC/IEEE Design Automation Conference (DAC).
[5] Yiorgos Makris,et al. Hardware Trojans in Analog, Mixed-Signal, and RF ICs , 2018 .
[6] Mark Mohammad Tehranipoor,et al. Hacking and protecting IC hardware , 2014, 2014 Design, Automation & Test in Europe Conference & Exhibition (DATE).
[7] Lok-Won Kim,et al. A Trojan-resistant system-on-chip bus architecture , 2009, MILCOM 2009 - 2009 IEEE Military Communications Conference.
[8] Umit Y. Ogras,et al. Flexibility-Aware System-on-Polymer (SoP): Concept to Prototype , 2017, IEEE Transactions on Multi-Scale Computing Systems.
[9] Jakob Rieck. Attacks on fitness trackers revisited: a case-study of unfit firmware security , 2016, Sicherheit.
[10] Devu Manikantan Shila,et al. I can detect you: Using intrusion checkers to resist malicious firmware attacks , 2016, 2016 IEEE Symposium on Technologies for Homeland Security (HST).
[11] Benjamin Morin,et al. What If You Can't Trust Your Network Card? , 2011, RAID.
[12] Song Guo,et al. Just-in-Time Code Offloading for Wearable Computing , 2015, IEEE Transactions on Emerging Topics in Computing.
[13] Ümit Y. Ogras,et al. PCB Hardware Trojans: Attack Modes and Detection Strategies , 2019, 2019 IEEE 37th VLSI Test Symposium (VTS).
[14] Christof Paar,et al. MOLES: Malicious off-chip leakage enabled by side-channels , 2009, 2009 IEEE/ACM International Conference on Computer-Aided Design - Digest of Technical Papers.
[15] Yiorgos Makris,et al. Toward automatic proof generation for information flow policies in third-party hardware IP , 2015, 2015 IEEE International Symposium on Hardware Oriented Security and Trust (HOST).
[16] Arnab Raha,et al. Powering the Internet of Things , 2014, 2014 IEEE/ACM International Symposium on Low Power Electronics and Design (ISLPED).
[17] Fatih Karabacak,et al. Detection of malicious hardware components in mobile platforms , 2016, 2016 17th International Symposium on Quality Electronic Design (ISQED).
[18] Yiorgos Makris,et al. Hardware Trojans in Wireless Cryptographic ICs , 2010, IEEE Design & Test of Computers.
[19] Jaehyun Park,et al. Near-optimal energy allocation for self-powered wearable systems , 2017, 2017 IEEE/ACM International Conference on Computer-Aided Design (ICCAD).
[20] Hannes Tschofenig,et al. Securing the Internet of Things: A Standardization Perspective , 2014, IEEE Internet of Things Journal.
[21] Domenic Forte,et al. Leveraging Side-Channel Information for Disassembly and Security , 2019, ACM J. Emerg. Technol. Comput. Syst..
[22] Giorgio Di Natale,et al. Hardware Trojan Attacks in Analog/Mixed-Signal ICs via the Test Access Mechanism , 2020, 2020 IEEE European Test Symposium (ETS).
[23] Yiorgos Makris,et al. Trusted and Secure Design of Analog/RF ICs: Recent Developments , 2019, 2019 IEEE 25th International Symposium on On-Line Testing and Robust System Design (IOLTS).
[24] Farinaz Koushanfar,et al. A Survey of Hardware Trojan Taxonomy and Detection , 2010, IEEE Design & Test of Computers.
[25] Michail Maniatakos,et al. Impact of firmware modification attacks on power systems field devices , 2015, 2015 IEEE International Conference on Smart Grid Communications (SmartGridComm).
[26] Qassim Nasir,et al. Firmware Update Attacks and Security for IoT Devices: Survey , 2019, ArabWIC 2019.
[27] Christos A. Papachristou,et al. Process reliability based trojans through NBTI and HCI effects , 2010, 2010 NASA/ESA Conference on Adaptive Hardware and Systems.
[28] H. Shill,et al. Trends in Technology Usage for Parkinson's Disease Assessment: A Systematic Review , 2021, medRxiv.
[29] Zhenkai Liang,et al. Jump-oriented programming: a new class of code-reuse attack , 2011, ASIACCS '11.
[30] Srivaths Ravi,et al. Security in embedded systems: Design challenges , 2004, TECS.
[31] Qiaoyan Yu,et al. Exploiting error control approaches for Hardware Trojans on Network-on-Chip links , 2013, 2013 IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFTS).
[32] Swarup Bhunia,et al. Towards Trojan-Free Trusted ICs: Problem Analysis and Detection Scheme , 2008, 2008 Design, Automation and Test in Europe.
[33] Fatih Karabacak,et al. Work-in-progress: remote detection of unauthorized activity via spectral analysis , 2017, 2017 International Conference on Hardware/Software Codesign and System Synthesis (CODES+ISSS).
[34] Yann Bachy,et al. Smart-TV Security Analysis: Practical Experiments , 2015, 2015 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks.
[35] Mark Mohammad Tehranipoor,et al. A Novel Built-In Self-Authentication Technique to Prevent Inserting Hardware Trojans , 2014, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems.
[36] Michail Maniatakos,et al. ConFirm: Detecting firmware modifications in embedded systems using Hardware Performance Counters , 2015, 2015 IEEE/ACM International Conference on Computer-Aided Design (ICCAD).
[37] Debdeep Mukhopadhyay,et al. RAPPER: Ransomware Prevention via Performance Counters , 2018, ArXiv.
[38] Srivaths Ravi,et al. Security as a new dimension in embedded system design , 2004, Proceedings. 41st Design Automation Conference, 2004..
[39] Fatih Karabacak,et al. Remote detection of unauthorized activity via spectral analysis: work-in-progress , 2017, CODES+ISSS.
[40] Michael S. Hsiao,et al. A Novel Sustained Vector Technique for the Detection of Hardware Trojans , 2009, 2009 22nd International Conference on VLSI Design.
[41] Jeyavijayan Rajendran,et al. Hardware security: Threat models and metrics , 2013, 2013 IEEE/ACM International Conference on Computer-Aided Design (ICCAD).
[42] Michail Maniatakos,et al. The Cybersecurity Landscape in Industrial Control Systems , 2016, Proceedings of the IEEE.
[43] Swarup Bhunia,et al. TeSR: A robust Temporal Self-Referencing approach for Hardware Trojan detection , 2011, 2011 IEEE International Symposium on Hardware-Oriented Security and Trust.
[44] Berk Sunar,et al. Trojan Detection using IC Fingerprinting , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[45] Farinaz Koushanfar,et al. High-sensitivity hardware Trojan detection using multimodal characterization , 2013, 2013 Design, Automation & Test in Europe Conference & Exhibition (DATE).
[46] Sandeep K. Gupta,et al. Trojan detection via delay measurements: A new approach to select paths and vectors to maximize effectiveness and minimize cost , 2013, 2013 Design, Automation & Test in Europe Conference & Exhibition (DATE).