update proposal
This commit is contained in:
parent
f20570f5d0
commit
737c930a15
13 changed files with 751 additions and 228 deletions
|
|
@ -1976,3 +1976,101 @@ keywords = {activity recognition, activity sensing, energy monitoring, infrastru
|
|||
location = {Copenhagen, Denmark},
|
||||
series = {UbiComp '10}
|
||||
}
|
||||
|
||||
@misc{hdd_malware,
|
||||
title = {Indestructible malware by Equation cyberspies is out there – but don’t panic (yet)},
|
||||
howpublished = {\url{https://www.kaspersky.com/blog/equation-hdd-malware/7623/}},
|
||||
note = {Accessed: 2023-03-15}
|
||||
}
|
||||
|
||||
@INPROCEEDINGS{8057232,
|
||||
|
||||
author={Chen, Yimin and Jin, Xiaocong and Sun, Jingchao and Zhang, Rui and Zhang, Yanchao},
|
||||
|
||||
booktitle={IEEE INFOCOM 2017 - IEEE Conference on Computer Communications},
|
||||
|
||||
title={POWERFUL: Mobile app fingerprinting via power analysis},
|
||||
|
||||
year={2017},
|
||||
|
||||
volume={},
|
||||
|
||||
number={},
|
||||
|
||||
pages={1-9},
|
||||
|
||||
doi={10.1109/INFOCOM.2017.8057232}
|
||||
}
|
||||
|
||||
@article{sayakkara2019survey,
|
||||
title={A survey of electromagnetic side-channel attacks and discussion on their case-progressing potential for digital forensics},
|
||||
author={Sayakkara, Asanka and Le-Khac, Nhien-An and Scanlon, Mark},
|
||||
journal={Digital Investigation},
|
||||
volume={29},
|
||||
pages={43--54},
|
||||
year={2019},
|
||||
publisher={Elsevier}
|
||||
}
|
||||
@ARTICLE{9727162,
|
||||
|
||||
author={Kim, Taehun and Shin, Youngjoo},
|
||||
|
||||
journal={IEEE Access},
|
||||
|
||||
title={ThermalBleed: A Practical Thermal Side-Channel Attack},
|
||||
|
||||
year={2022},
|
||||
|
||||
volume={10},
|
||||
|
||||
number={},
|
||||
|
||||
pages={25718-25731},
|
||||
|
||||
doi={10.1109/ACCESS.2022.3156596}}
|
||||
|
||||
@article{page2003defending,
|
||||
title={Defending against cache-based side-channel attacks},
|
||||
author={Page, Daniel},
|
||||
journal={Information Security Technical Report},
|
||||
volume={8},
|
||||
number={1},
|
||||
pages={30--44},
|
||||
year={2003},
|
||||
publisher={Elsevier}
|
||||
}
|
||||
@article{halevi2015keyboard,
|
||||
title={Keyboard acoustic side channel attacks: exploring realistic and security-sensitive scenarios},
|
||||
author={Halevi, Tzipora and Saxena, Nitesh},
|
||||
journal={International Journal of Information Security},
|
||||
volume={14},
|
||||
pages={443--456},
|
||||
year={2015},
|
||||
publisher={Springer}
|
||||
}
|
||||
@inproceedings{van2018side,
|
||||
title={Side-channel based intrusion detection for industrial control systems},
|
||||
author={Van Aubel, Pol and Papagiannopoulos, Kostas and Chmielewski, {\L}ukasz and Doerr, Christian},
|
||||
booktitle={Critical Information Infrastructures Security: 12th International Conference, CRITIS 2017, Lucca, Italy, October 8-13, 2017, Revised Selected Papers 12},
|
||||
pages={207--224},
|
||||
year={2018},
|
||||
organization={Springer}
|
||||
}
|
||||
@ARTICLE{10016748,
|
||||
|
||||
author={Xun, Yijie and Deng, Zhouyan and Liu, Jiajia and Zhao, Yilin},
|
||||
|
||||
journal={IEEE Transactions on Vehicular Technology},
|
||||
|
||||
title={Side Channel Analysis: A Novel Intrusion Detection System Based on Vehicle Voltage Signals},
|
||||
|
||||
year={2023},
|
||||
|
||||
volume={},
|
||||
|
||||
number={},
|
||||
|
||||
pages={1-10},
|
||||
|
||||
doi={10.1109/TVT.2023.3236820}}
|
||||
|
||||
|
|
|
|||
Loading…
Add table
Add a link
Reference in a new issue