暂无分享,去创建一个
Junfeng Yang | Simha Sethumadhavan | Hidenori Kobayashi | Miguel A. Arroyo | Miguel A. Arroyo | Junfeng Yang | S. Sethumadhavan | Hidenori Kobayashi
[1] Bill Broyles. Notes , 1907, The Classical Review.
[2] Martin Roesch,et al. Snort - Lightweight Intrusion Detection for Networks , 1999 .
[3] Miguel Castro,et al. Practical byzantine fault tolerance and proactive recovery , 2002, TOCS.
[4] Archana Ganapathi,et al. Why Do Internet Services Fail, and What Can Be Done About It? , 2002, USENIX Symposium on Internet Technologies and Systems.
[5] Pradeep K. Khosla,et al. SWATT: softWare-based attestation for embedded devices , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.
[6] Martín Abadi,et al. Control-flow integrity , 2005, CCS '05.
[7] Yi Ding. Recovery-Oriented Computing : Main Techniques of Building Multitier Dependability , 2007 .
[8] S. Bhatkar,et al. Data Space Randomization , 2008, DIMVA.
[9] Xi Wang,et al. Intrusion Recovery Using Selective Re-execution , 2010, OSDI.
[10] Shwetak N. Patel,et al. Experimental Security Analysis of a Modern Automobile , 2010, 2010 IEEE Symposium on Security and Privacy.
[11] Matti Valovirta,et al. Experimental Security Analysis of a Modern Automobile , 2011 .
[12] Hovav Shacham,et al. Comprehensive Experimental Analyses of Automotive Attack Surfaces , 2011, USENIX Security Symposium.
[13] Xi Wang,et al. Improving Integer Security for Systems with KINT , 2012, OSDI.
[14] Per Larsen,et al. Diversifying the Software Stack Using Randomized NOP Insertion , 2013, Moving Target Defense.
[15] Florian Dörfler,et al. Attack Detection and Identification in Cyber-Physical Systems -- Part II: Centralized and Distributed Monitor Design , 2012, ArXiv.
[16] Wenyuan Xu,et al. Ghost Talk: Mitigating EMI Signal Injection Attacks against Analog Sensors , 2013, 2013 IEEE Symposium on Security and Privacy.
[17] Ehab Al-Shaer,et al. Moving Target Defense for Hardening the Security of the Power System State Estimation , 2014, MTD '14.
[18] Paulo Tabuada,et al. Secure Estimation and Control for Cyber-Physical Systems Under Adversarial Attacks , 2012, IEEE Transactions on Automatic Control.
[19] John Launchbury,et al. Building embedded systems with embedded DSLs , 2014, ICFP 2014.
[20] Todd E. Humphreys,et al. Unmanned Aircraft Capture and Control Via GPS Spoofing , 2014, J. Field Robotics.
[21] Yongdae Kim,et al. Rocking Drones with Intentional Sound Noise on Gyroscopic Sensors , 2015, USENIX Security Symposium.
[22] Yasser Shoukry Sakr. Security and Privacy in Cyber-Physical Systems: Physical Attacks and Countermeasures , 2015 .
[23] Mani Srivastava,et al. PyCRA: Physical Challenge-Response Authentication For Active Sensors Under Spoofing Attacks , 2015, CCS.
[24] Ahmad-Reza Sadeghi,et al. Isomeron: Code Randomization Resilient to (Just-In-Time) Return-Oriented Programming , 2015, NDSS.
[25] William W. Streilein,et al. Timely Rerandomization for Mitigating Memory Disclosures , 2015, CCS.
[26] Per Larsen,et al. Leakage-Resilient Layout Randomization for Mobile Devices , 2016, NDSS.
[27] Marco Caccamo,et al. Reset-based recovery for real-time cyber-physical systems with temporal safety constraints , 2016, 2016 IEEE 21st International Conference on Emerging Technologies and Factory Automation (ETFA).
[28] Hao Wu,et al. Controlling UAVs with Sensor Input Spoofing Attacks , 2016, WOOT.
[29] Henrik Sandberg,et al. Limiting the Impact of Stealthy Attacks on Industrial Control Systems , 2016, CCS.
[30] Chen Yan. Can You Trust Autonomous Vehicles : Contactless Attacks against Sensors of Self-driving Vehicle , 2016 .
[31] Junfeng Yang,et al. Shuffler: Fast and Deployable Continuous Code Re-Randomization , 2016, OSDI.
[32] Chun-Kun,et al. Lecture Note Sel4: Formal Verification of an Os Kernel , 2022 .