emsoft2022 poster and presentation

This commit is contained in:
Arthur 'Grizzly' Grisel-Davy 2022-10-10 22:22:05 -04:00
parent bc0c042845
commit 82fafbe76f
30 changed files with 3588 additions and 0 deletions

529
BPV/emsoft2022/bibli.bib Normal file
View file

@ -0,0 +1,529 @@
@online{cve-firmware,
author = {mitre.org},
title = {cve.mitre.org},
year = 2021,
url = {https://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=Firmware},
urldate = {2021-12-7}
}
@article{BASNIGHT201376,
title = {Firmware modification attacks on programmable logic controllers},
journal = {International Journal of Critical Infrastructure Protection},
volume = {6},
number = {2},
pages = {76-84},
year = {2013},
issn = {1874-5482},
doi = {https://doi.org/10.1016/j.ijcip.2013.04.004},
url = {https://www.sciencedirect.com/science/article/pii/S1874548213000231},
author = {Zachry Basnight and Jonathan Butts and Juan Lopez and Thomas Dube},
}
@misc{rieck2016attacks,
title={Attacks on Fitness Trackers Revisited: A Case-Study of Unfit Firmware Security},
author={Jakob Rieck},
year={2016},
eprint={1604.03313},
archivePrefix={arXiv},
primaryClass={cs.CR}
}
@inproceedings {185175,
author = {Jacob Maskiewicz and Benjamin Ellis and James Mouradian and Hovav Shacham},
title = {Mouse Trap: Exploiting Firmware Updates in {USB} Peripherals},
booktitle = {8th {USENIX} Workshop on Offensive Technologies ({WOOT} 14)},
year = {2014},
address = {San Diego, CA},
url = {https://www.usenix.org/conference/woot14/workshop-program/presentation/maskiewicz},
publisher = {{USENIX} Association},
month = aug,
}
@online{usb_killer,
author = {Dark Purple },
title = {USB Killer},
year = 2021,
url = {https://kukuruku.co/post/usb-killer/},
urldate = {2021-12-18}
}
@online{rubber_ducky,
author = {Hack5},
title = {Rubber Ducky, LAN Turtle, Key Croc},
year = 2021,
url = {https://hak5.org/collections/sale/products/usb-rubber-ducky-deluxe},
urldate = {2021-12-18}
}
@online{minio,
author = {MinIO},
title = {MinIO},
year = 2021,
url = {https://min.io/},
urldate = {2021-12-18}
}
@INPROCEEDINGS{firmware_blockchain,
author={Lim, Jea-Min and Kim, Youngpil and Yoo, Chuck},
booktitle={2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData)},
title={Chain Veri: Blockchain-Based Firmware Verification System for IoT Environment},
year={2018},
volume={},
number={},
pages={1050-1056},
doi={10.1109/Cybermatics_2018.2018.00194}}
@InProceedings{firmware_blockchain_2,
author="Lee, Boohyung
and Malik, Sehrish
and Wi, Sarang
and Lee, Jong-Hyouk",
editor="Lee, Jong-Hyouk
and Pack, Sangheon",
title="Firmware Verification of Embedded Devices Based on a Blockchain",
booktitle="Quality, Reliability, Security and Robustness in Heterogeneous Networks",
year="2017",
publisher="Springer International Publishing",
address="Cham",
pages="52--61",
isbn="978-3-319-60717-7"
}
@InProceedings{firmware_data,
author="McMinn, Lucille
and Butts, Jonathan",
editor="Butts, Jonathan
and Shenoi, Sujeet",
title="A Firmware Verification Tool for Programmable Logic Controllers",
booktitle="Critical Infrastructure Protection VI",
year="2012",
publisher="Springer Berlin Heidelberg",
address="Berlin, Heidelberg",
pages="59--69",
isbn="978-3-642-35764-0"
}
@INPROCEEDINGS{firmware_crypto,
author={Nilsson, Dennis K. and Sun, Lei and Nakajima, Tatsuo},
booktitle={2008 IEEE Globecom Workshops},
title={A Framework for Self-Verification of Firmware Updates over the Air in Vehicle ECUs},
year={2008},
volume={},
number={},
pages={1-5},
doi={10.1109/GLOCOMW.2008.ECP.56}}
@InProceedings{firmware_sign,
author="Jeong, Eunseon
and Park, Junyoung
and Son, Byeonggeun
and Kim, Myoungsu
and Yim, Kangbin",
editor="Barolli, Leonard
and Xhafa, Fatos
and Javaid, Nadeem
and Enokido, Tomoya",
title="Study on Signature Verification Process for the Firmware of an Android Platform",
booktitle="Innovative Mobile and Internet Services in Ubiquitous Computing",
year="2019",
publisher="Springer International Publishing",
address="Cham",
pages="540--545",
isbn="978-3-319-93554-6"
}
@misc{mitre,
title = {MITRE ATT\&CK® T1542.001 Pre-OS Boot: System Firmware},
howpublished = {\url{https://attack.mitre.org/versions/v10/techniques/T1542/001/}},
note = {Accessed: 2022-03-31}
}
@misc{capec,
title = {CAPEC-532: Altered Installed BIOS},
howpublished = {\url{https://capec.mitre.org/data/definitions/532.html}},
note = {Accessed: 2022-03-31}
}
@misc{coreboot,
title = {Coreboot. Fast, secure and flexible OpenSource firmware},
howpublished = {\url{https://www.coreboot.org/}},
note = {Accessed: 2022-03-31}
}
@misc{owrt,
title = {OpenWrt},
howpublished = {\url{https://openwrt.org/}},
note = {Accessed: 2022-03-31}
}
@misc{ddwrt,
title = {DD-WRT},
howpublished = {\url{https://dd-wrt.com/}},
note = {Accessed: 2022-03-31}
}
@misc{freshtomato,
title = {FreshTomato},
howpublished = {\url{https://www.freshtomato.org/}},
note = {Accessed: 2022-03-31}
}
@misc{trustanchor,
title = {Cisco's Trustworthy Technology Datasheet},
howpublished = {\url{https://www.cisco.com/c/dam/en_us/about/doing_business/trust-center/docs/trustworthy-technologies-datasheet.pdf}},
note = {Accessed: 2022-04-06}
}
@misc{downtime,
title = {How to Calculate Data Center Downtime},
howpublished = {\url{https://datacenterfrontier.com/how-calculate-data-center-downtime/}},
note = {Accessed: 2022-04-06}
}
@misc{cryptoreview,
author = {YongBin Zhou and
DengGuo Feng},
title = {Side-Channel Attacks: Ten Years After Its Publication and the Impacts on Cryptographic Module Security Testing},
howpublished = {Cryptology ePrint Archive, Report 2005/388},
year = {2005},
note = {\url{https://ia.cr/2005/388}},
}
@misc{curveattack,
author = {Roberto M. Avanzi},
title = {Side Channel Attacks on Implementations of Curve-Based Cryptographic Primitives},
howpublished = {Cryptology ePrint Archive, Report 2005/017},
year = {2005},
note = {\url{https://ia.cr/2005/017}},
}
@InProceedings{keyboard,
author="Anand, S. Abhishek
and Saxena, Nitesh",
editor="Grossklags, Jens
and Preneel, Bart",
title="A Sound for a Sound: Mitigating Acoustic Side Channel Attacks on Password Keystrokes with Active Sounds",
booktitle="Financial Cryptography and Data Security",
year="2017",
publisher="Springer Berlin Heidelberg",
address="Berlin, Heidelberg",
pages="346--364",
}
@INPROCEEDINGS{printer,
author={Al Faruque, Mohammad Abdullah and Chhetri, Sujit Rokka and Canedo, Arquimedes and Wan, Jiang},
booktitle={2016 ACM/IEEE 7th International Conference on Cyber-Physical Systems (ICCPS)},
title={Acoustic Side-Channel Attacks on Additive Manufacturing Systems},
year={2016},
volume={},
number={},
pages={1-10},
doi={10.1109/ICCPS.2016.7479068}}
@inproceedings{iot_anoamly_sca,
author = {Devin Spatz and Devin Smarra and Igor Ternovskiy},
title = {{A review of anomaly detection techniques leveraging side-channel emissions}},
volume = {11011},
booktitle = {Cyber Sensing 2019},
editor = {Igor V. Ternovskiy and Peter Chin},
organization = {International Society for Optics and Photonics},
publisher = {SPIE},
pages = {48 -- 55},
keywords = {Rf emission, loT, Cyber security},
year = {2019},
doi = {10.1117/12.2521450},
URL = {https://doi.org/10.1117/12.2521450}
}
@INPROCEEDINGS{power-devices,
author={Konstantinou, Charalambos and Maniatakos, Michail},
booktitle={2015 IEEE International Conference on Smart Grid Communications (SmartGridComm)},
title={Impact of firmware modification attacks on power systems field devices},
year={2015},
volume={},
number={},
pages={283-288},
doi={10.1109/SmartGridComm.2015.7436314}}
@article{plc_firmware,
title = {Firmware modification attacks on programmable logic controllers},
journal = {International Journal of Critical Infrastructure Protection},
volume = {6},
number = {2},
pages = {76-84},
year = {2013},
issn = {1874-5482},
doi = {https://doi.org/10.1016/j.ijcip.2013.04.004},
url = {https://www.sciencedirect.com/science/article/pii/S1874548213000231},
author = {Zachry Basnight and Jonathan Butts and Juan Lopez and Thomas Dube},
keywords = {Industrial control systems, Programmable logic controllers, Firmware, Modification attacks, Reverse engineering},
}
@article{santamarta2012here,
title={Here be backdoors: A journey into the secrets of industrial firmware},
author={Santamarta, Ruben},
journal={Black Hat USA},
year={2012}
}
@ARTICLE{health_review, author={Yaqoob, Tahreem and Abbas, Haider and Atiquzzaman, Mohammed}, journal={IEEE Communications Surveys Tutorials}, title={Security Vulnerabilities, Attacks, Countermeasures, and Regulations of Networked Medical Devices—A Review}, year={2019}, volume={21}, number={4}, pages={3723-3768}, doi={10.1109/COMST.2019.2914094}}
@article{pacemaker,
author = {Adrian Baranchuk and Bryce Alexander and Debra Campbell and Sohaib Haseeb and Damian Redfearn and Chris Simpson and Ben Glover },
title = {Pacemaker Cybersecurity},
journal = {Circulation},
volume = {138},
number = {12},
pages = {1272-1273},
year = {2018},
doi = {10.1161/CIRCULATIONAHA.118.035261},
URL = {https://www.ahajournals.org/doi/abs/10.1161/CIRCULATIONAHA.118.035261},
eprint = {https://www.ahajournals.org/doi/pdf/10.1161/CIRCULATIONAHA.118.035261}
}
@article{medical_case_study,
author = {Ang Cui, Michael Costello and Salvatore J. Stolfo},
title = {When Firmware Modifications Attack: A Case Study of Embedded Exploitation},
journal = {20th Annual Network & Distributed System Security Symposium 2013},
year = {2013},
}
@InProceedings{railway,
author="B{\"a}ckman, Ronny
and Oliver, Ian
and Limonta, Gabriela",
editor="Casimiro, Ant{\'o}nio
and Ortmeier, Frank
and Schoitsch, Erwin
and Bitsch, Friedemann
and Ferreira, Pedro",
title="Integrity Checking of Railway Interlocking Firmware",
booktitle="Computer Safety, Reliability, and Security. SAFECOMP 2020 Workshops",year="2020",
publisher="Springer International Publishing",
address="Cham",
pages="161--175",}
@INPROCEEDINGS{cars, author={Nilsson, Dennis K. and Phung, Phu H. and Larson, Ulf E.}, booktitle={IET Road Transport Information and Control - RTIC 2008 and ITS United Kingdom Members' Conference}, title={Vehicle ECU classification based on safety-security characteristics}, year={2008}, volume={}, number={}, pages={1-7}, doi={10.1049/ic.2008.0810}}
@article{BASNIGHT201376,
title = {Firmware modification attacks on programmable logic controllers},
journal = {International Journal of Critical Infrastructure Protection},
volume = {6},
number = {2},
pages = {76-84},
year = {2013},
issn = {1874-5482},
doi = {https://doi.org/10.1016/j.ijcip.2013.04.004},
url = {https://www.sciencedirect.com/science/article/pii/S1874548213000231},
author = {Zachry Basnight and Jonathan Butts and Juan Lopez and Thomas Dube},
keywords = {Industrial control systems, Programmable logic controllers, Firmware, Modification attacks, Reverse engineering}
}
@INPROCEEDINGS{9065145,
author = {Gao, Chao and Luo, Lan and Zhang, Yue and Pearson, Bryan and Fu, Xinwen},
booktitle={2019 IEEE International Conference on Industrial Internet (ICII)},
title={Microcontroller Based IoT System Firmware Security: Case Studies},
year={2019},
volume={},
number={},
pages={200-209},
doi={10.1109/ICII.2019.00045}
}
@article{thrangrycats,
title={Thrangrycat flaw lets attackers plant persistent backdoors on Cisco gear},
author={Cimpanu, C},
journal={Accessed: Sep},
volume={15},
pages={2019},
year={2019}
}
@article{hidden,
title={Source Hidden for Double Blind Review},
author={Jhon Doe},
journal = {Journal},
year = {2022},
}
@INPROCEEDINGS{blockchain1,
author={Dhakal, Samip and Jaafar, Fehmi and Zavarsky, Pavol},
booktitle={2019 IEEE 19th International Symposium on High Assurance Systems Engineering (HASE)},
title={Private Blockchain Network for IoT Device Firmware Integrity Verification and Update},
year={2019},
volume={},
number={},
pages={164-170},
doi={10.1109/HASE.2019.00033}}
@inproceedings{sca_attack,
author = {Liu, Yannan and Wei, Lingxiao and Zhou, Zhe and Zhang, Kehuan and Xu, Wenyuan and Xu, Qiang},
title = {On Code Execution Tracking via Power Side-Channel},
year = {2016},
isbn = {9781450341394},
publisher = {Association for Computing Machinery},
address = {New York, NY, USA},
url = {https://doi.org/10.1145/2976749.2978299},
doi = {10.1145/2976749.2978299},
booktitle = {Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security},
pages = {10191031},
numpages = {13},
keywords = {code execution tracking, power side-channel, embedded system, hardware security},
location = {Vienna, Austria},
series = {CCS '16}
}
@INPROCEEDINGS{7928948, author={Krishnankutty, Deepak and Robucci, Ryan and Banerjee, Nilanjan and Patel, Chintan}, booktitle={2017 IEEE 35th VLSI Test Symposium (VTS)}, title={Fiscal: Firmware identification using side-channel power analysis}, year={2017}, volume={}, number={}, pages={1-6}, doi={10.1109/VTS.2017.7928948}}
@inproceedings{ssd_firmware,
author = {Brown, Dane and Walker, Owens and Rakvic, Ryan and Ives, Robert W. and Ngo, Hau and Shey, James and Blanco, Justin},
title = {Towards Detection of Modified Firmware on Solid State Drives via Side Channel Analysis},
year = {2018},
isbn = {9781450364751},
publisher = {Association for Computing Machinery},
address = {New York, NY, USA},
url = {https://doi.org/10.1145/3240302.3285860},
doi = {10.1145/3240302.3285860},
booktitle = {Proceedings of the International Symposium on Memory Systems},
pages = {315320},
numpages = {6},
keywords = {firmware, security, classification, embedded systems},
location = {Alexandria, Virginia, USA},
series = {MEMSYS '18}
}
@article{timing,
title = {Using timing-based side channels for anomaly detection in industrial control systems},
journal = {International Journal of Critical Infrastructure Protection},
volume = {15},
pages = {12-26},
year = {2016},
issn = {1874-5482},
doi = {https://doi.org/10.1016/j.ijcip.2016.07.003},
url = {https://www.sciencedirect.com/science/article/pii/S1874548216301111},
author = {Stephen Dunlap and Jonathan Butts and Juan Lopez and Mason Rice and Barry Mullins},
}
@INPROCEEDINGS{DTU, author={Xu, Aidong and Jiang, Yixin and Cao, Yang and Zhang, Guoming and Ji, Xiaoyu and Xu, Wenyuan}, booktitle={2019 IEEE 3rd Conference on Energy Internet and Energy System Integration (EI2)}, title={ADDP: Anomaly Detection for DTU Based on Power Consumption Side-Channel}, year={2019}, volume={}, number={}, pages={2659-2663}, doi={10.1109/EI247390.2019.9062014}}
@inproceedings {wud,
author = {Shane S. Clark and Benjamin Ransford and Amir Rahmati and Shane Guineau and Jacob Sorber and Wenyuan Xu and Kevin Fu},
title = {{WattsUpDoc}: Power Side Channels to Nonintrusively Discover Untargeted Malware on Embedded Medical Devices},
booktitle = {2013 USENIX Workshop on Health Information Technologies (HealthTech 13)},
year = {2013},
address = {Washington, D.C.},
url = {https://www.usenix.org/conference/healthtech13/workshop-program/presentation/clark},
publisher = {USENIX Association},
month = aug,
}
@misc{dataset,
author = {Arthur Grisel-Davy},
title = {Dataset of bootup power consumption traces for four networking equipment \url{https://doi.org/10.5281/zenodo.6419214}},
month = apr,
year = 2022,
publisher = {Zenodo},
doi = {10.5281/zenodo.6419214},
}
@book{han2011data,
title={Data mining: concepts and techniques},
author={Han, Jiawei and Pei, Jian and Kamber, Micheline},
year={2011},
publisher={Elsevier}
}
@article{zimmering2021generating,
title={Generating Artificial Sensor Data for the Comparison of Unsupervised Machine Learning Methods},
author={Zimmering, Bernd and Niggemann, Oliver and Hasterok, Constanze and Pfannstiel, Erik and Ramming, Dario and Pfrommer, Julius},
journal={Sensors},
volume={21},
number={7},
pages={2397},
year={2021},
publisher={Multidisciplinary Digital Publishing Institute}
}
@misc{xLED,
doi = {10.48550/ARXIV.1706.01140},
url = {https://arxiv.org/abs/1706.01140},
author = {Guri, Mordechai and Zadov, Boris and Daidakulov, Andrey and Elovici, Yuval},
keywords = {Cryptography and Security (cs.CR), FOS: Computer and information sciences, FOS: Computer and information sciences},
title = {xLED: Covert Data Exfiltration from Air-Gapped Networks via Router LEDs},
publisher = {arXiv},
year = {2017},
copyright = {arXiv.org perpetual, non-exclusive license}
}
@MISC{CVE-2019-19642,
title = {{CVE}-2019-19642.},
howpublished = "MITRE, {CVE-ID} CVE-2019-19642.",
year = {2019},
url={https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19642 },
urldate={30 May 2022}
}
@MISC{CVE-2020-15046,
title = {{CVE}-2020-15046.},
howpublished = "MITRE, {CVE-ID} CVE-2020-15046.",
year = {2020},
url={https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15046},
urldate={30 May 2022}
}
@article{ismail2019deep,
title={Deep learning for time series classification: a review},
author={Ismail Fawaz, Hassan and Forestier, Germain and Weber, Jonathan and Idoumghar, Lhassane and Muller, Pierre-Alain},
journal={Data mining and knowledge discovery},
volume={33},
number={4},
pages={917--963},
year={2019},
publisher={Springer}
}