backup typst

This commit is contained in:
Arthur Grisel-Davy 2023-06-19 15:49:07 -04:00
parent 5cc9ea1e76
commit 6dff086d6c
4 changed files with 689 additions and 341 deletions

View file

@ -20,12 +20,12 @@ author = {Zachry Basnight and Jonathan Butts and Juan Lopez and Thomas Dube},
}
@misc{rieck2016attacks,
title={Attacks on Fitness Trackers Revisited: A Case-Study of Unfit Firmware Security},
author={Jakob Rieck},
year={2016},
eprint={1604.03313},
archivePrefix={arXiv},
primaryClass={cs.CR}
title={Attacks on Fitness Trackers Revisited: A Case-Study of Unfit Firmware Security},
author={Jakob Rieck},
year={2016},
eprint={1604.03313},
archivePrefix={arXiv},
primaryClass={cs.CR}
}
@inproceedings {185175,
@ -40,27 +40,27 @@ month = aug,
}
@online{usb_killer,
author = {Dark Purple },
title = {USB Killer},
year = 2021,
url = {https://kukuruku.co/post/usb-killer/},
urldate = {2021-12-18}
author = {Dark Purple },
title = {USB Killer},
year = 2021,
url = {https://kukuruku.co/post/usb-killer/},
urldate = {2021-12-18}
}
@online{lan_turtle,
author = {Hack5},
title = {LAN Turtle},
year = 2021,
url = {https://hak5.org/collections/sale/products/lan-turtle},
urldate = {2021-12-18}
author = {Hack5},
title = {LAN Turtle},
year = 2021,
url = {https://hak5.org/collections/sale/products/lan-turtle},
urldate = {2021-12-18}
}
@online{rubber_ducky,
author = {Hack5},
title = {Rubber Ducky},
year = 2021,
url = {https://hak5.org/collections/sale/products/usb-rubber-ducky-deluxe},
urldate = {2021-12-18}
author = {Hack5},
title = {Rubber Ducky},
year = 2021,
url = {https://hak5.org/collections/sale/products/usb-rubber-ducky-deluxe},
urldate = {2021-12-18}
}
@online{key_croc,
@ -80,20 +80,18 @@ month = aug,
}
@INPROCEEDINGS{firmware_blockchain,
author={Lim, Jea-Min and Kim, Youngpil and Yoo, Chuck},
booktitle={2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData)},
title={Chain Veri: Blockchain-Based Firmware Verification System for IoT Environment},
year={2018},
volume={},
number={},
pages={1050-1056},
doi={10.1109/Cybermatics_2018.2018.00194}}
author={Lim, Jea-Min and Kim, Youngpil and Yoo, Chuck},
booktitle={2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData)},
title={Chain Veri: Blockchain-Based Firmware Verification System for IoT Environment},
year={2018},
volume={},
number={},
pages={1050-1056},
doi={10.1109/Cybermatics_2018.2018.00194}
}
@InProceedings{firmware_blockchain_2,
author="Lee, Boohyung
and Malik, Sehrish
and Wi, Sarang
and Lee, Jong-Hyouk",
author={Lee, Boohyung and Malik, Sehrish and Wi, Sarang and Lee, Jong-Hyouk},
editor="Lee, Jong-Hyouk
and Pack, Sangheon",
title="Firmware Verification of Embedded Devices Based on a Blockchain",
@ -106,8 +104,7 @@ isbn="978-3-319-60717-7"
}
@InProceedings{firmware_data,
author="McMinn, Lucille
and Butts, Jonathan",
author={McMinn, Lucille and Butts, Jonathan},
editor="Butts, Jonathan
and Shenoi, Sujeet",
title="A Firmware Verification Tool for Programmable Logic Controllers",
@ -120,26 +117,20 @@ isbn="978-3-642-35764-0"
}
@INPROCEEDINGS{firmware_crypto,
author={Nilsson, Dennis K. and Sun, Lei and Nakajima, Tatsuo},
booktitle={2008 IEEE Globecom Workshops},
title={A Framework for Self-Verification of Firmware Updates over the Air in Vehicle ECUs},
year={2008},
volume={},
number={},
pages={1-5},
doi={10.1109/GLOCOMW.2008.ECP.56}}
author={Nilsson, Dennis K. and Sun, Lei and Nakajima, Tatsuo},
booktitle={2008 IEEE Globecom Workshops},
title={A Framework for Self-Verification of Firmware Updates over the Air in Vehicle ECUs},
year={2008},
volume={},
number={},
pages={1-5},
doi={10.1109/GLOCOMW.2008.ECP.56}
}
@InProceedings{firmware_sign,
author="Jeong, Eunseon
and Park, Junyoung
and Son, Byeonggeun
and Kim, Myoungsu
and Yim, Kangbin",
editor="Barolli, Leonard
and Xhafa, Fatos
and Javaid, Nadeem
and Enokido, Tomoya",
title="Study on Signature Verification Process for the Firmware of an Android Platform",
author={Jeong, Eunseon and Park, Junyoung and Son, Byeonggeun and Kim, Myoungsu and Yim, Kangbin},
editor={Barolli, Leonard and Xhafa, Fatos and Javaid, Nadeem and Enokido, Tomoya},
title={Study on Signature Verification Process for the Firmware of an Android Platform},
booktitle="Innovative Mobile and Internet Services in Ubiquitous Computing",
year="2019",
publisher="Springer International Publishing",
@ -150,73 +141,77 @@ isbn="978-3-319-93554-6"
@misc{mitre,
title = {MITRE ATT&CK® T1542.001 Pre-OS Boot: System Firmware},
howpublished = {\url{https://attack.mitre.org/versions/v10/techniques/T1542/001/}},
howpublished = {https://attack.mitre.org/versions/v10/techniques/T1542/001/},
note = {Accessed: 2022-03-31}
}
@misc{capec,
title = {CAPEC-532: Altered Installed BIOS},
howpublished = {\url{https://capec.mitre.org/data/definitions/532.html}},
howpublished = {https://capec.mitre.org/data/definitions/532.html},
note = {Accessed: 2022-03-31}
}
@misc{coreboot,
title = {Coreboot. Fast, secure and flexible OpenSource firmware},
howpublished = {\url{https://www.coreboot.org/}},
howpublished = {https://www.coreboot.org/},
note = {Accessed: 2022-03-31}
}
@misc{owrt,
title = {OpenWrt},
howpublished = {\url{https://openwrt.org/}},
howpublished = {https://openwrt.org/},
note = {Accessed: 2022-03-31}
}
@misc{ddwrt,
title = {DD-WRT},
howpublished = {\url{https://dd-wrt.com/}},
howpublished = {https://dd-wrt.com/},
note = {Accessed: 2022-03-31}
}
@misc{freshtomato,
title = {FreshTomato},
howpublished = {\url{https://www.freshtomato.org/}},
howpublished = {https://www.freshtomato.org/},
note = {Accessed: 2022-03-31}
}
@misc{droneincrease,
title= {Futur of Drone Industry},
howpublished ={https://www.strategicmarketresearch.com/blogs/drone-industry-future},
note={accessed: 2023-06}
}
@misc{trustanchor,
title = {Cisco's Trustworthy Technology Datasheet},
howpublished = {\url{https://www.cisco.com/c/dam/en_us/about/doing_business/trust-center/docs/trustworthy-technologies-datasheet.pdf}},
howpublished = {https://www.cisco.com/c/dam/en_us/about/doing_business/trust-center/docs/trustworthy-technologies-datasheet.pdf},
note = {Accessed: 2022-04-06}
}
@misc{downtime,
title = {How to Calculate Data Center Downtime},
howpublished = {\url{https://datacenterfrontier.com/how-calculate-data-center-downtime/}},
howpublished = {https://datacenterfrontier.com/how-calculate-data-center-downtime/},
note = {Accessed: 2022-04-06}
}
@misc{cryptoreview,
author = {YongBin Zhou and
DengGuo Feng},
title = {Side-Channel Attacks: Ten Years After Its Publication and the Impacts on Cryptographic Module Security Testing},
howpublished = {Cryptology ePrint Archive, Report 2005/388},
year = {2005},
note = {\url{https://ia.cr/2005/388}},
author = {YongBin Zhou and DengGuo Feng},
title = {Side-Channel Attacks: Ten Years After Its Publication and the Impacts on Cryptographic Module Security Testing},
howpublished = {Cryptology ePrint Archive, Report 2005/388},
year = {2005},
note = {https://ia.cr/2005/388},
}
@misc{curveattack,
author = {Roberto M. Avanzi},
title = {Side Channel Attacks on Implementations of Curve-Based Cryptographic Primitives},
howpublished = {Cryptology ePrint Archive, Report 2005/017},
year = {2005},
note = {\url{https://ia.cr/2005/017}},
author = {Roberto M. Avanzi},
title = {Side Channel Attacks on Implementations of Curve-Based Cryptographic Primitives},
howpublished = {Cryptology ePrint Archive, Report 2005/017},
year = {2005},
note = {https://ia.cr/2005/017},
}
@InProceedings{keyboard,
author="Anand, S. Abhishek
and Saxena, Nitesh",
author={Anand, S. Abhishek and Saxena, Nitesh},
editor="Grossklags, Jens
and Preneel, Bart",
title="A Sound for a Sound: Mitigating Acoustic Side Channel Attacks on Password Keystrokes with Active Sounds",
@ -228,22 +223,15 @@ pages="346--364",
}
@INPROCEEDINGS{printer,
author={Al Faruque, Mohammad Abdullah and Chhetri, Sujit Rokka and Canedo, Arquimedes and Wan, Jiang},
booktitle={2016 ACM/IEEE 7th International Conference on Cyber-Physical Systems (ICCPS)},
title={Acoustic Side-Channel Attacks on Additive Manufacturing Systems},
year={2016},
volume={},
number={},
pages={1-10},
doi={10.1109/ICCPS.2016.7479068}}
author={Al Faruque, Mohammad Abdullah and Chhetri, Sujit Rokka and Canedo, Arquimedes and Wan, Jiang},
booktitle={2016 ACM/IEEE 7th International Conference on Cyber-Physical Systems (ICCPS)},
title={Acoustic Side-Channel Attacks on Additive Manufacturing Systems},
year={2016},
volume={},
number={},
pages={1-10},
doi={10.1109/ICCPS.2016.7479068}
}
@inproceedings{iot_anoamly_sca,
author = {Devin Spatz and Devin Smarra and Igor Ternovskiy},
@ -261,22 +249,15 @@ URL = {https://doi.org/10.1117/12.2521450}
}
@INPROCEEDINGS{power-devices,
author={Konstantinou, Charalambos and Maniatakos, Michail},
booktitle={2015 IEEE International Conference on Smart Grid Communications (SmartGridComm)},
title={Impact of firmware modification attacks on power systems field devices},
year={2015},
volume={},
number={},
pages={283-288},
doi={10.1109/SmartGridComm.2015.7436314}}
author={Konstantinou, Charalambos and Maniatakos, Michail},
booktitle={2015 IEEE International Conference on Smart Grid Communications (SmartGridComm)},
title={Impact of firmware modification attacks on power systems field devices},
year={2015},
volume={},
number={},
pages={283-288},
doi={10.1109/SmartGridComm.2015.7436314}
}
@article{plc_firmware,
title = {Firmware modification attacks on programmable logic controllers},
@ -301,11 +282,6 @@ keywords = {Industrial control systems, Programmable logic controllers, Firmware
@ARTICLE{health_review, author={Yaqoob, Tahreem and Abbas, Haider and Atiquzzaman, Mohammed}, journal={IEEE Communications Surveys Tutorials}, title={Security Vulnerabilities, Attacks, Countermeasures, and Regulations of Networked Medical Devices—A Review}, year={2019}, volume={21}, number={4}, pages={3723-3768}, doi={10.1109/COMST.2019.2914094}}
@article{pacemaker,
author = {Adrian Baranchuk and Bryce Alexander and Debra Campbell and Sohaib Haseeb and Damian Redfearn and Chris Simpson and Ben Glover },
title = {Pacemaker Cybersecurity},
@ -327,9 +303,7 @@ year = {2013},
}
@InProceedings{railway,
author="B{\"a}ckman, Ronny
and Oliver, Ian
and Limonta, Gabriela",
author={B{\"a}ckman, Ronny and Oliver, Ian and Limonta, Gabriela},
editor="Casimiro, Ant{\'o}nio
and Ortmeier, Frank
and Schoitsch, Erwin
@ -378,22 +352,15 @@ keywords = {Industrial control systems, Programmable logic controllers, Firmware
}
@INPROCEEDINGS{blockchain1,
author={Dhakal, Samip and Jaafar, Fehmi and Zavarsky, Pavol},
booktitle={2019 IEEE 19th International Symposium on High Assurance Systems Engineering (HASE)},
title={Private Blockchain Network for IoT Device Firmware Integrity Verification and Update},
year={2019},
volume={},
number={},
pages={164-170},
doi={10.1109/HASE.2019.00033}}
doi={10.1109/HASE.2019.00033}
}
@inproceedings{sca_attack,
author = {Liu, Yannan and Wei, Lingxiao and Zhou, Zhe and Zhang, Kehuan and Xu, Wenyuan and Xu, Qiang},
@ -457,32 +424,63 @@ month = aug,
}
@dataset{dataset,
author = {Anonymous},
title = {{Dataset of bootup power consumption traces for
four networking equipments.}},
month = apr,
year = 2022,
publisher = {Zenodo},
doi = {10.5281/zenodo.6419214},
url = {https://doi.org/10.5281/zenodo.6419214}
author = {Anonymous},
title = {Dataset of bootup power consumption traces for four networking equipments.},
month = apr,
year = 2022,
publisher = {Zenodo},
doi = {10.5281/zenodo.6419214},
url = {https://doi.org/10.5281/zenodo.6419214}
}
@book{han2011data,
title={Data mining: concepts and techniques},
author={Han, Jiawei and Pei, Jian and Kamber, Micheline},
year={2011},
publisher={Elsevier}
title={Data mining: concepts and techniques},
author={Han, Jiawei and Pei, Jian and Kamber, Micheline},
year={2011},
publisher={Elsevier}
}
@article{zimmering2021generating,
title={Generating Artificial Sensor Data for the Comparison of Unsupervised Machine Learning Methods},
author={Zimmering, Bernd and Niggemann, Oliver and Hasterok, Constanze and Pfannstiel, Erik and Ramming, Dario and Pfrommer, Julius},
journal={Sensors},
volume={21},
number={7},
pages={2397},
year={2021},
publisher={Multidisciplinary Digital Publishing Institute}
title={Generating Artificial Sensor Data for the Comparison of Unsupervised Machine Learning Methods},
author={Zimmering, Bernd and Niggemann, Oliver and Hasterok, Constanze and Pfannstiel, Erik and Ramming, Dario and Pfrommer, Julius},
journal={Sensors},
volume={21},
number={7},
pages={2397},
year={2021},
publisher={Multidisciplinary Digital Publishing Institute}
}
@INPROCEEDINGS{8326960,
author={Dey, Vishal and Pudi, Vikramkumar and Chattopadhyay, Anupam and Elovici, Yuval},
booktitle={2018 31st International Conference on VLSI Design and 2018 17th International Conference on Embedded Systems (VLSID)},
title={Security Vulnerabilities of Unmanned Aerial Vehicles and Countermeasures: An Experimental Study},
year={2018},
volume={},
number={},
pages={398-403},
doi={10.1109/VLSID.2018.97}
}
@INPROCEEDINGS{8433205,
author={Chen, Wenxin and Dong, Yingfei and Duan, Zhenhai},
booktitle={2018 IEEE Conference on Communications and Network Security (CNS)},
title={Manipulating Drone Dynamic State Estimation to Compromise Navigation},
year={2018},
volume={},
number={},
pages={1-9},
doi={10.1109/CNS.2018.8433205}
}
@ARTICLE{8556480,
author={Bisio, Igor and Garibotto, Chiara and Lavagetto, Fabio and Sciarrone, Andrea and Zappatore, Sandro},
journal={IEEE Transactions on Vehicular Technology},
title={Blind Detection: Advanced Techniques for WiFi-Based Drone Surveillance},
year={2019},
volume={68},
number={1},
pages={938-946},
doi={10.1109/TVT.2018.2884767}
}