PowerKey: Generating Secret Keys from Power Line Electromagnetic Interferences
暂无分享,去创建一个
[1] Abraham Pressman,et al. Switching Power Supply Design , 1997 .
[2] Younghyun Kim,et al. VoltKey , 2019, Proc. ACM Interact. Mob. Wearable Ubiquitous Technol..
[3] Ahmad-Reza Sadeghi,et al. Context-Based Zero-Interaction Pairing and Key Evolution for Advanced Personal Devices , 2014, CCS.
[4] Shaolei Ren,et al. Your Noise, My Signal: Exploiting Switching Noise for Stealthy Data Exfiltration from Desktop Computers , 2020, Abstracts of the 2020 SIGMETRICS/Performance Joint International Conference on Measurement and Modeling of Computer Systems.
[5] Sneha Kumar Kasera,et al. Secret Key Extraction from Wireless Signal Strength in Real Environments , 2009, IEEE Transactions on Mobile Computing.
[6] Milos Prvulovic,et al. A Practical Methodology for Measuring the Side-Channel Signal Available to the Attacker for Instruction-Level Events , 2014, 2014 47th Annual IEEE/ACM International Symposium on Microarchitecture.
[7] Amarjeet Singh,et al. An in depth study into using EMI signatures for appliance identification , 2014, BuildSys@SenSys.
[8] Mohammad Abdullah Al Faruque,et al. Exploiting Wireless Channel Randomness to Generate Keys for Automotive Cyber-Physical System Security , 2016, 2016 ACM/IEEE 7th International Conference on Cyber-Physical Systems (ICCPS).
[9] Ahmad-Reza Sadeghi,et al. Revisiting Context-Based Authentication in IoT , 2018, 2018 55th ACM/ESDA/IEEE Design Automation Conference (DAC).
[10] Shwetak N. Patel,et al. ElectriSense: single-point sensing using EMI for electrical event detection and classification in the home , 2010, UbiComp.
[11] Shaojie Tang,et al. FREE: A Fast and Robust Key Extraction Mechanism via Inaudible Acoustic Signal , 2019, MobiHoc.
[12] Shwetak N. Patel,et al. Whole-home gesture recognition using wireless signals , 2013, MobiCom.
[13] Qian Zhang,et al. Secret from Muscle: Enabling Secure Pairing with Electromyography , 2016, SenSys.
[14] On Semiconductor. SWITCHMODE™ Power Supply Reference Manual , 1999 .
[15] Wei Wang,et al. Authenticating On-Body Backscatter by Exploiting Propagation Signatures , 2018, Proc. ACM Interact. Mob. Wearable Ubiquitous Technol..
[16] Desney S. Tan,et al. Your noise is my command: sensing gestures using the body as an antenna , 2011, CHI.
[17] Brian A. Carter,et al. Advanced Encryption Standard , 2007 .
[18] Harold Joseph Highland,et al. Electromagnetic interference , 1988, Comput. Secur..
[19] J. Bibb Cain,et al. Error-Correction Coding for Digital Communications , 1981 .
[20] Abbas Jamalipour,et al. Wireless communications , 2005, GLOBECOM '05. IEEE Global Telecommunications Conference, 2005..
[21] Dorothy Kerr. Run Test for Randomness , 1968 .
[22] Zhichao Cao,et al. GeneWave: Fast authentication and key agreement on commodity mobile devices , 2017, 2017 IEEE 25th International Conference on Network Protocols (ICNP).
[23] Wade Trappe,et al. Radio-telepathy: extracting a secret key from an unauthenticated wireless channel , 2008, MobiCom '08.
[24] D.M. Mount,et al. An Efficient k-Means Clustering Algorithm: Analysis and Implementation , 2002, IEEE Trans. Pattern Anal. Mach. Intell..
[25] Shwetak N. Patel,et al. Televisions, video privacy, and powerline electromagnetic interference , 2011, CCS '11.
[26] Shaolei Ren,et al. Ohm's Law in Data Centers: A Voltage Side Channel for Timing Power Attacks , 2018, CCS.
[27] Yang Li,et al. Natural Timestamps in Powerline Electromagnetic Radiation , 2018, ACM Trans. Sens. Networks.
[28] Eyal de Lara,et al. Amigo: Proximity-Based Authentication of Mobile Devices , 2007, UbiComp.
[29] Xiang-Yang Li,et al. Instant and Robust Authentication and Key Agreement among Mobile Devices , 2016, CCS.
[30] Tao Jiang,et al. Securing On-Body IoT Devices By Exploiting Creeping Wave Propagation , 2018, IEEE Journal on Selected Areas in Communications.
[31] David K. Y. Yau,et al. Exploiting Electrical Grid for Accurate and Secure Clock Synchronization , 2018, ACM Trans. Sens. Networks.
[32] Wade Trappe,et al. ProxiMate: proximity-based secure pairing using ambient wireless signals , 2011, MobiSys '11.
[33] Zhenyu Yan,et al. Towards Touch-to-Access Device Authentication Using Induced Body Electric Potentials , 2019, MobiCom.
[34] Junqing Zhang,et al. Key Generation From Wireless Channels: A Review , 2016, IEEE Access.