backup typst
This commit is contained in:
parent
5cc9ea1e76
commit
6dff086d6c
4 changed files with 689 additions and 341 deletions
|
|
@ -20,12 +20,12 @@ author = {Zachry Basnight and Jonathan Butts and Juan Lopez and Thomas Dube},
|
|||
}
|
||||
|
||||
@misc{rieck2016attacks,
|
||||
title={Attacks on Fitness Trackers Revisited: A Case-Study of Unfit Firmware Security},
|
||||
author={Jakob Rieck},
|
||||
year={2016},
|
||||
eprint={1604.03313},
|
||||
archivePrefix={arXiv},
|
||||
primaryClass={cs.CR}
|
||||
title={Attacks on Fitness Trackers Revisited: A Case-Study of Unfit Firmware Security},
|
||||
author={Jakob Rieck},
|
||||
year={2016},
|
||||
eprint={1604.03313},
|
||||
archivePrefix={arXiv},
|
||||
primaryClass={cs.CR}
|
||||
}
|
||||
|
||||
@inproceedings {185175,
|
||||
|
|
@ -40,27 +40,27 @@ month = aug,
|
|||
}
|
||||
|
||||
@online{usb_killer,
|
||||
author = {Dark Purple },
|
||||
title = {USB Killer},
|
||||
year = 2021,
|
||||
url = {https://kukuruku.co/post/usb-killer/},
|
||||
urldate = {2021-12-18}
|
||||
author = {Dark Purple },
|
||||
title = {USB Killer},
|
||||
year = 2021,
|
||||
url = {https://kukuruku.co/post/usb-killer/},
|
||||
urldate = {2021-12-18}
|
||||
}
|
||||
|
||||
@online{lan_turtle,
|
||||
author = {Hack5},
|
||||
title = {LAN Turtle},
|
||||
year = 2021,
|
||||
url = {https://hak5.org/collections/sale/products/lan-turtle},
|
||||
urldate = {2021-12-18}
|
||||
author = {Hack5},
|
||||
title = {LAN Turtle},
|
||||
year = 2021,
|
||||
url = {https://hak5.org/collections/sale/products/lan-turtle},
|
||||
urldate = {2021-12-18}
|
||||
}
|
||||
|
||||
@online{rubber_ducky,
|
||||
author = {Hack5},
|
||||
title = {Rubber Ducky},
|
||||
year = 2021,
|
||||
url = {https://hak5.org/collections/sale/products/usb-rubber-ducky-deluxe},
|
||||
urldate = {2021-12-18}
|
||||
author = {Hack5},
|
||||
title = {Rubber Ducky},
|
||||
year = 2021,
|
||||
url = {https://hak5.org/collections/sale/products/usb-rubber-ducky-deluxe},
|
||||
urldate = {2021-12-18}
|
||||
}
|
||||
|
||||
@online{key_croc,
|
||||
|
|
@ -80,20 +80,18 @@ month = aug,
|
|||
}
|
||||
|
||||
@INPROCEEDINGS{firmware_blockchain,
|
||||
author={Lim, Jea-Min and Kim, Youngpil and Yoo, Chuck},
|
||||
booktitle={2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData)},
|
||||
title={Chain Veri: Blockchain-Based Firmware Verification System for IoT Environment},
|
||||
year={2018},
|
||||
volume={},
|
||||
number={},
|
||||
pages={1050-1056},
|
||||
doi={10.1109/Cybermatics_2018.2018.00194}}
|
||||
author={Lim, Jea-Min and Kim, Youngpil and Yoo, Chuck},
|
||||
booktitle={2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData)},
|
||||
title={Chain Veri: Blockchain-Based Firmware Verification System for IoT Environment},
|
||||
year={2018},
|
||||
volume={},
|
||||
number={},
|
||||
pages={1050-1056},
|
||||
doi={10.1109/Cybermatics_2018.2018.00194}
|
||||
}
|
||||
|
||||
@InProceedings{firmware_blockchain_2,
|
||||
author="Lee, Boohyung
|
||||
and Malik, Sehrish
|
||||
and Wi, Sarang
|
||||
and Lee, Jong-Hyouk",
|
||||
author={Lee, Boohyung and Malik, Sehrish and Wi, Sarang and Lee, Jong-Hyouk},
|
||||
editor="Lee, Jong-Hyouk
|
||||
and Pack, Sangheon",
|
||||
title="Firmware Verification of Embedded Devices Based on a Blockchain",
|
||||
|
|
@ -106,8 +104,7 @@ isbn="978-3-319-60717-7"
|
|||
}
|
||||
|
||||
@InProceedings{firmware_data,
|
||||
author="McMinn, Lucille
|
||||
and Butts, Jonathan",
|
||||
author={McMinn, Lucille and Butts, Jonathan},
|
||||
editor="Butts, Jonathan
|
||||
and Shenoi, Sujeet",
|
||||
title="A Firmware Verification Tool for Programmable Logic Controllers",
|
||||
|
|
@ -120,26 +117,20 @@ isbn="978-3-642-35764-0"
|
|||
}
|
||||
|
||||
@INPROCEEDINGS{firmware_crypto,
|
||||
author={Nilsson, Dennis K. and Sun, Lei and Nakajima, Tatsuo},
|
||||
booktitle={2008 IEEE Globecom Workshops},
|
||||
title={A Framework for Self-Verification of Firmware Updates over the Air in Vehicle ECUs},
|
||||
year={2008},
|
||||
volume={},
|
||||
number={},
|
||||
pages={1-5},
|
||||
doi={10.1109/GLOCOMW.2008.ECP.56}}
|
||||
author={Nilsson, Dennis K. and Sun, Lei and Nakajima, Tatsuo},
|
||||
booktitle={2008 IEEE Globecom Workshops},
|
||||
title={A Framework for Self-Verification of Firmware Updates over the Air in Vehicle ECUs},
|
||||
year={2008},
|
||||
volume={},
|
||||
number={},
|
||||
pages={1-5},
|
||||
doi={10.1109/GLOCOMW.2008.ECP.56}
|
||||
}
|
||||
|
||||
@InProceedings{firmware_sign,
|
||||
author="Jeong, Eunseon
|
||||
and Park, Junyoung
|
||||
and Son, Byeonggeun
|
||||
and Kim, Myoungsu
|
||||
and Yim, Kangbin",
|
||||
editor="Barolli, Leonard
|
||||
and Xhafa, Fatos
|
||||
and Javaid, Nadeem
|
||||
and Enokido, Tomoya",
|
||||
title="Study on Signature Verification Process for the Firmware of an Android Platform",
|
||||
author={Jeong, Eunseon and Park, Junyoung and Son, Byeonggeun and Kim, Myoungsu and Yim, Kangbin},
|
||||
editor={Barolli, Leonard and Xhafa, Fatos and Javaid, Nadeem and Enokido, Tomoya},
|
||||
title={Study on Signature Verification Process for the Firmware of an Android Platform},
|
||||
booktitle="Innovative Mobile and Internet Services in Ubiquitous Computing",
|
||||
year="2019",
|
||||
publisher="Springer International Publishing",
|
||||
|
|
@ -150,73 +141,77 @@ isbn="978-3-319-93554-6"
|
|||
|
||||
@misc{mitre,
|
||||
title = {MITRE ATT&CK® T1542.001 Pre-OS Boot: System Firmware},
|
||||
howpublished = {\url{https://attack.mitre.org/versions/v10/techniques/T1542/001/}},
|
||||
howpublished = {https://attack.mitre.org/versions/v10/techniques/T1542/001/},
|
||||
note = {Accessed: 2022-03-31}
|
||||
}
|
||||
|
||||
@misc{capec,
|
||||
title = {CAPEC-532: Altered Installed BIOS},
|
||||
howpublished = {\url{https://capec.mitre.org/data/definitions/532.html}},
|
||||
howpublished = {https://capec.mitre.org/data/definitions/532.html},
|
||||
note = {Accessed: 2022-03-31}
|
||||
}
|
||||
|
||||
@misc{coreboot,
|
||||
title = {Coreboot. Fast, secure and flexible OpenSource firmware},
|
||||
howpublished = {\url{https://www.coreboot.org/}},
|
||||
howpublished = {https://www.coreboot.org/},
|
||||
note = {Accessed: 2022-03-31}
|
||||
}
|
||||
|
||||
@misc{owrt,
|
||||
title = {OpenWrt},
|
||||
howpublished = {\url{https://openwrt.org/}},
|
||||
howpublished = {https://openwrt.org/},
|
||||
note = {Accessed: 2022-03-31}
|
||||
}
|
||||
|
||||
@misc{ddwrt,
|
||||
title = {DD-WRT},
|
||||
howpublished = {\url{https://dd-wrt.com/}},
|
||||
howpublished = {https://dd-wrt.com/},
|
||||
note = {Accessed: 2022-03-31}
|
||||
}
|
||||
|
||||
@misc{freshtomato,
|
||||
title = {FreshTomato},
|
||||
howpublished = {\url{https://www.freshtomato.org/}},
|
||||
howpublished = {https://www.freshtomato.org/},
|
||||
note = {Accessed: 2022-03-31}
|
||||
}
|
||||
|
||||
@misc{droneincrease,
|
||||
title= {Futur of Drone Industry},
|
||||
howpublished ={https://www.strategicmarketresearch.com/blogs/drone-industry-future},
|
||||
note={accessed: 2023-06}
|
||||
}
|
||||
|
||||
@misc{trustanchor,
|
||||
title = {Cisco's Trustworthy Technology Datasheet},
|
||||
howpublished = {\url{https://www.cisco.com/c/dam/en_us/about/doing_business/trust-center/docs/trustworthy-technologies-datasheet.pdf}},
|
||||
howpublished = {https://www.cisco.com/c/dam/en_us/about/doing_business/trust-center/docs/trustworthy-technologies-datasheet.pdf},
|
||||
note = {Accessed: 2022-04-06}
|
||||
}
|
||||
|
||||
@misc{downtime,
|
||||
title = {How to Calculate Data Center Downtime},
|
||||
howpublished = {\url{https://datacenterfrontier.com/how-calculate-data-center-downtime/}},
|
||||
howpublished = {https://datacenterfrontier.com/how-calculate-data-center-downtime/},
|
||||
note = {Accessed: 2022-04-06}
|
||||
}
|
||||
|
||||
|
||||
@misc{cryptoreview,
|
||||
author = {YongBin Zhou and
|
||||
DengGuo Feng},
|
||||
title = {Side-Channel Attacks: Ten Years After Its Publication and the Impacts on Cryptographic Module Security Testing},
|
||||
howpublished = {Cryptology ePrint Archive, Report 2005/388},
|
||||
year = {2005},
|
||||
note = {\url{https://ia.cr/2005/388}},
|
||||
author = {YongBin Zhou and DengGuo Feng},
|
||||
title = {Side-Channel Attacks: Ten Years After Its Publication and the Impacts on Cryptographic Module Security Testing},
|
||||
howpublished = {Cryptology ePrint Archive, Report 2005/388},
|
||||
year = {2005},
|
||||
note = {https://ia.cr/2005/388},
|
||||
}
|
||||
|
||||
@misc{curveattack,
|
||||
author = {Roberto M. Avanzi},
|
||||
title = {Side Channel Attacks on Implementations of Curve-Based Cryptographic Primitives},
|
||||
howpublished = {Cryptology ePrint Archive, Report 2005/017},
|
||||
year = {2005},
|
||||
note = {\url{https://ia.cr/2005/017}},
|
||||
author = {Roberto M. Avanzi},
|
||||
title = {Side Channel Attacks on Implementations of Curve-Based Cryptographic Primitives},
|
||||
howpublished = {Cryptology ePrint Archive, Report 2005/017},
|
||||
year = {2005},
|
||||
note = {https://ia.cr/2005/017},
|
||||
}
|
||||
|
||||
@InProceedings{keyboard,
|
||||
author="Anand, S. Abhishek
|
||||
and Saxena, Nitesh",
|
||||
author={Anand, S. Abhishek and Saxena, Nitesh},
|
||||
editor="Grossklags, Jens
|
||||
and Preneel, Bart",
|
||||
title="A Sound for a Sound: Mitigating Acoustic Side Channel Attacks on Password Keystrokes with Active Sounds",
|
||||
|
|
@ -228,22 +223,15 @@ pages="346--364",
|
|||
}
|
||||
|
||||
@INPROCEEDINGS{printer,
|
||||
|
||||
author={Al Faruque, Mohammad Abdullah and Chhetri, Sujit Rokka and Canedo, Arquimedes and Wan, Jiang},
|
||||
|
||||
booktitle={2016 ACM/IEEE 7th International Conference on Cyber-Physical Systems (ICCPS)},
|
||||
|
||||
title={Acoustic Side-Channel Attacks on Additive Manufacturing Systems},
|
||||
|
||||
year={2016},
|
||||
|
||||
volume={},
|
||||
|
||||
number={},
|
||||
|
||||
pages={1-10},
|
||||
|
||||
doi={10.1109/ICCPS.2016.7479068}}
|
||||
author={Al Faruque, Mohammad Abdullah and Chhetri, Sujit Rokka and Canedo, Arquimedes and Wan, Jiang},
|
||||
booktitle={2016 ACM/IEEE 7th International Conference on Cyber-Physical Systems (ICCPS)},
|
||||
title={Acoustic Side-Channel Attacks on Additive Manufacturing Systems},
|
||||
year={2016},
|
||||
volume={},
|
||||
number={},
|
||||
pages={1-10},
|
||||
doi={10.1109/ICCPS.2016.7479068}
|
||||
}
|
||||
|
||||
@inproceedings{iot_anoamly_sca,
|
||||
author = {Devin Spatz and Devin Smarra and Igor Ternovskiy},
|
||||
|
|
@ -261,22 +249,15 @@ URL = {https://doi.org/10.1117/12.2521450}
|
|||
}
|
||||
|
||||
@INPROCEEDINGS{power-devices,
|
||||
|
||||
author={Konstantinou, Charalambos and Maniatakos, Michail},
|
||||
|
||||
booktitle={2015 IEEE International Conference on Smart Grid Communications (SmartGridComm)},
|
||||
|
||||
title={Impact of firmware modification attacks on power systems field devices},
|
||||
|
||||
year={2015},
|
||||
|
||||
volume={},
|
||||
|
||||
number={},
|
||||
|
||||
pages={283-288},
|
||||
|
||||
doi={10.1109/SmartGridComm.2015.7436314}}
|
||||
author={Konstantinou, Charalambos and Maniatakos, Michail},
|
||||
booktitle={2015 IEEE International Conference on Smart Grid Communications (SmartGridComm)},
|
||||
title={Impact of firmware modification attacks on power systems field devices},
|
||||
year={2015},
|
||||
volume={},
|
||||
number={},
|
||||
pages={283-288},
|
||||
doi={10.1109/SmartGridComm.2015.7436314}
|
||||
}
|
||||
|
||||
@article{plc_firmware,
|
||||
title = {Firmware modification attacks on programmable logic controllers},
|
||||
|
|
@ -301,11 +282,6 @@ keywords = {Industrial control systems, Programmable logic controllers, Firmware
|
|||
|
||||
@ARTICLE{health_review, author={Yaqoob, Tahreem and Abbas, Haider and Atiquzzaman, Mohammed}, journal={IEEE Communications Surveys Tutorials}, title={Security Vulnerabilities, Attacks, Countermeasures, and Regulations of Networked Medical Devices—A Review}, year={2019}, volume={21}, number={4}, pages={3723-3768}, doi={10.1109/COMST.2019.2914094}}
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
@article{pacemaker,
|
||||
author = {Adrian Baranchuk and Bryce Alexander and Debra Campbell and Sohaib Haseeb and Damian Redfearn and Chris Simpson and Ben Glover },
|
||||
title = {Pacemaker Cybersecurity},
|
||||
|
|
@ -327,9 +303,7 @@ year = {2013},
|
|||
}
|
||||
|
||||
@InProceedings{railway,
|
||||
author="B{\"a}ckman, Ronny
|
||||
and Oliver, Ian
|
||||
and Limonta, Gabriela",
|
||||
author={B{\"a}ckman, Ronny and Oliver, Ian and Limonta, Gabriela},
|
||||
editor="Casimiro, Ant{\'o}nio
|
||||
and Ortmeier, Frank
|
||||
and Schoitsch, Erwin
|
||||
|
|
@ -378,22 +352,15 @@ keywords = {Industrial control systems, Programmable logic controllers, Firmware
|
|||
}
|
||||
|
||||
@INPROCEEDINGS{blockchain1,
|
||||
|
||||
author={Dhakal, Samip and Jaafar, Fehmi and Zavarsky, Pavol},
|
||||
|
||||
booktitle={2019 IEEE 19th International Symposium on High Assurance Systems Engineering (HASE)},
|
||||
|
||||
title={Private Blockchain Network for IoT Device Firmware Integrity Verification and Update},
|
||||
|
||||
year={2019},
|
||||
|
||||
volume={},
|
||||
|
||||
number={},
|
||||
|
||||
pages={164-170},
|
||||
|
||||
doi={10.1109/HASE.2019.00033}}
|
||||
doi={10.1109/HASE.2019.00033}
|
||||
}
|
||||
|
||||
@inproceedings{sca_attack,
|
||||
author = {Liu, Yannan and Wei, Lingxiao and Zhou, Zhe and Zhang, Kehuan and Xu, Wenyuan and Xu, Qiang},
|
||||
|
|
@ -457,32 +424,63 @@ month = aug,
|
|||
}
|
||||
|
||||
@dataset{dataset,
|
||||
author = {Anonymous},
|
||||
title = {{Dataset of bootup power consumption traces for
|
||||
four networking equipments.}},
|
||||
month = apr,
|
||||
year = 2022,
|
||||
publisher = {Zenodo},
|
||||
doi = {10.5281/zenodo.6419214},
|
||||
url = {https://doi.org/10.5281/zenodo.6419214}
|
||||
author = {Anonymous},
|
||||
title = {Dataset of bootup power consumption traces for four networking equipments.},
|
||||
month = apr,
|
||||
year = 2022,
|
||||
publisher = {Zenodo},
|
||||
doi = {10.5281/zenodo.6419214},
|
||||
url = {https://doi.org/10.5281/zenodo.6419214}
|
||||
}
|
||||
|
||||
@book{han2011data,
|
||||
title={Data mining: concepts and techniques},
|
||||
author={Han, Jiawei and Pei, Jian and Kamber, Micheline},
|
||||
year={2011},
|
||||
publisher={Elsevier}
|
||||
title={Data mining: concepts and techniques},
|
||||
author={Han, Jiawei and Pei, Jian and Kamber, Micheline},
|
||||
year={2011},
|
||||
publisher={Elsevier}
|
||||
}
|
||||
|
||||
@article{zimmering2021generating,
|
||||
title={Generating Artificial Sensor Data for the Comparison of Unsupervised Machine Learning Methods},
|
||||
author={Zimmering, Bernd and Niggemann, Oliver and Hasterok, Constanze and Pfannstiel, Erik and Ramming, Dario and Pfrommer, Julius},
|
||||
journal={Sensors},
|
||||
volume={21},
|
||||
number={7},
|
||||
pages={2397},
|
||||
year={2021},
|
||||
publisher={Multidisciplinary Digital Publishing Institute}
|
||||
title={Generating Artificial Sensor Data for the Comparison of Unsupervised Machine Learning Methods},
|
||||
author={Zimmering, Bernd and Niggemann, Oliver and Hasterok, Constanze and Pfannstiel, Erik and Ramming, Dario and Pfrommer, Julius},
|
||||
journal={Sensors},
|
||||
volume={21},
|
||||
number={7},
|
||||
pages={2397},
|
||||
year={2021},
|
||||
publisher={Multidisciplinary Digital Publishing Institute}
|
||||
}
|
||||
|
||||
@INPROCEEDINGS{8326960,
|
||||
author={Dey, Vishal and Pudi, Vikramkumar and Chattopadhyay, Anupam and Elovici, Yuval},
|
||||
booktitle={2018 31st International Conference on VLSI Design and 2018 17th International Conference on Embedded Systems (VLSID)},
|
||||
title={Security Vulnerabilities of Unmanned Aerial Vehicles and Countermeasures: An Experimental Study},
|
||||
year={2018},
|
||||
volume={},
|
||||
number={},
|
||||
pages={398-403},
|
||||
doi={10.1109/VLSID.2018.97}
|
||||
}
|
||||
|
||||
@INPROCEEDINGS{8433205,
|
||||
author={Chen, Wenxin and Dong, Yingfei and Duan, Zhenhai},
|
||||
booktitle={2018 IEEE Conference on Communications and Network Security (CNS)},
|
||||
title={Manipulating Drone Dynamic State Estimation to Compromise Navigation},
|
||||
year={2018},
|
||||
volume={},
|
||||
number={},
|
||||
pages={1-9},
|
||||
doi={10.1109/CNS.2018.8433205}
|
||||
}
|
||||
|
||||
@ARTICLE{8556480,
|
||||
author={Bisio, Igor and Garibotto, Chiara and Lavagetto, Fabio and Sciarrone, Andrea and Zappatore, Sandro},
|
||||
journal={IEEE Transactions on Vehicular Technology},
|
||||
title={Blind Detection: Advanced Techniques for WiFi-Based Drone Surveillance},
|
||||
year={2019},
|
||||
volume={68},
|
||||
number={1},
|
||||
pages={938-946},
|
||||
doi={10.1109/TVT.2018.2884767}
|
||||
}
|
||||
|
||||
|
|
|
|||
Loading…
Add table
Add a link
Reference in a new issue