@online{cve-firmware, author = {mitre.org}, title = {cve.mitre.org}, year = 2021, url = {https://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=Firmware}, urldate = {2021-12-7} } @article{BASNIGHT201376, title = {Firmware modification attacks on programmable logic controllers}, journal = {International Journal of Critical Infrastructure Protection}, volume = {6}, number = {2}, pages = {76-84}, year = {2013}, issn = {1874-5482}, doi = {https://doi.org/10.1016/j.ijcip.2013.04.004}, url = {https://www.sciencedirect.com/science/article/pii/S1874548213000231}, author = {Zachry Basnight and Jonathan Butts and Juan Lopez and Thomas Dube}, } @misc{rieck2016attacks, title={Attacks on Fitness Trackers Revisited: A Case-Study of Unfit Firmware Security}, author={Jakob Rieck}, year={2016}, eprint={1604.03313}, archivePrefix={arXiv}, primaryClass={cs.CR} } @inproceedings {185175, author = {Jacob Maskiewicz and Benjamin Ellis and James Mouradian and Hovav Shacham}, title = {Mouse Trap: Exploiting Firmware Updates in {USB} Peripherals}, booktitle = {8th {USENIX} Workshop on Offensive Technologies ({WOOT} 14)}, year = {2014}, address = {San Diego, CA}, url = {https://www.usenix.org/conference/woot14/workshop-program/presentation/maskiewicz}, publisher = {{USENIX} Association}, month = aug, } @online{usb_killer, author = {Dark Purple }, title = {USB Killer}, year = 2021, url = {https://kukuruku.co/post/usb-killer/}, urldate = {2021-12-18} } @online{lan_turtle, author = {Hack5}, title = {LAN Turtle}, year = 2021, url = {https://hak5.org/collections/sale/products/lan-turtle}, urldate = {2021-12-18} } @online{rubber_ducky, author = {Hack5}, title = {Rubber Ducky}, year = 2021, url = {https://hak5.org/collections/sale/products/usb-rubber-ducky-deluxe}, urldate = {2021-12-18} } @online{key_croc, author = {Hack5}, title = {Key Coc}, year = 2021, url = {https://hak5.org/collections/sale/products/key-croc}, urldate = {2021-12-18} } @online{minio, author = {MinIO}, title = {MinIO}, year = 2021, url = {https://min.io/}, urldate = {2021-12-18} } @INPROCEEDINGS{firmware_blockchain, author={Lim, Jea-Min and Kim, Youngpil and Yoo, Chuck}, booktitle={2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData)}, title={Chain Veri: Blockchain-Based Firmware Verification System for IoT Environment}, year={2018}, volume={}, number={}, pages={1050-1056}, doi={10.1109/Cybermatics_2018.2018.00194} } @InProceedings{firmware_blockchain_2, author={Lee, Boohyung and Malik, Sehrish and Wi, Sarang and Lee, Jong-Hyouk}, editor="Lee, Jong-Hyouk and Pack, Sangheon", title="Firmware Verification of Embedded Devices Based on a Blockchain", booktitle="Quality, Reliability, Security and Robustness in Heterogeneous Networks", year="2017", publisher="Springer International Publishing", address="Cham", pages="52--61", isbn="978-3-319-60717-7" } @InProceedings{firmware_data, author={McMinn, Lucille and Butts, Jonathan}, editor="Butts, Jonathan and Shenoi, Sujeet", title="A Firmware Verification Tool for Programmable Logic Controllers", booktitle="Critical Infrastructure Protection VI", year="2012", publisher="Springer Berlin Heidelberg", address="Berlin, Heidelberg", pages="59--69", isbn="978-3-642-35764-0" } @INPROCEEDINGS{firmware_crypto, author={Nilsson, Dennis K. and Sun, Lei and Nakajima, Tatsuo}, booktitle={2008 IEEE Globecom Workshops}, title={A Framework for Self-Verification of Firmware Updates over the Air in Vehicle ECUs}, year={2008}, volume={}, number={}, pages={1-5}, doi={10.1109/GLOCOMW.2008.ECP.56} } @InProceedings{firmware_sign, author={Jeong, Eunseon and Park, Junyoung and Son, Byeonggeun and Kim, Myoungsu and Yim, Kangbin}, editor={Barolli, Leonard and Xhafa, Fatos and Javaid, Nadeem and Enokido, Tomoya}, title={Study on Signature Verification Process for the Firmware of an Android Platform}, booktitle="Innovative Mobile and Internet Services in Ubiquitous Computing", year="2019", publisher="Springer International Publishing", address="Cham", pages="540--545", isbn="978-3-319-93554-6" } @misc{mitre, title = {MITRE ATT&CK® T1542.001 Pre-OS Boot: System Firmware}, howpublished = {https://attack.mitre.org/versions/v10/techniques/T1542/001/}, note = {Accessed: 2022-03-31} } @misc{capec, title = {CAPEC-532: Altered Installed BIOS}, howpublished = {https://capec.mitre.org/data/definitions/532.html}, note = {Accessed: 2022-03-31} } @misc{coreboot, title = {Coreboot. Fast, secure and flexible OpenSource firmware}, howpublished = {https://www.coreboot.org/}, note = {Accessed: 2022-03-31} } @misc{owrt, title = {OpenWrt}, howpublished = {https://openwrt.org/}, note = {Accessed: 2022-03-31} } @misc{ddwrt, title = {DD-WRT}, howpublished = {https://dd-wrt.com/}, note = {Accessed: 2022-03-31} } @misc{freshtomato, title = {FreshTomato}, howpublished = {https://www.freshtomato.org/}, note = {Accessed: 2022-03-31} } @misc{droneincrease, title= {Futur of Drone Industry}, howpublished ={https://www.strategicmarketresearch.com/blogs/drone-industry-future}, note={accessed: 2023-06} } @misc{trustanchor, title = {Cisco's Trustworthy Technology Datasheet}, howpublished = {https://www.cisco.com/c/dam/en_us/about/doing_business/trust-center/docs/trustworthy-technologies-datasheet.pdf}, note = {Accessed: 2022-04-06} } @misc{downtime, title = {How to Calculate Data Center Downtime}, howpublished = {https://datacenterfrontier.com/how-calculate-data-center-downtime/}, note = {Accessed: 2022-04-06} } @misc{cryptoreview, author = {YongBin Zhou and DengGuo Feng}, title = {Side-Channel Attacks: Ten Years After Its Publication and the Impacts on Cryptographic Module Security Testing}, howpublished = {Cryptology ePrint Archive, Report 2005/388}, year = {2005}, note = {https://ia.cr/2005/388}, } @misc{curveattack, author = {Roberto M. Avanzi}, title = {Side Channel Attacks on Implementations of Curve-Based Cryptographic Primitives}, howpublished = {Cryptology ePrint Archive, Report 2005/017}, year = {2005}, note = {https://ia.cr/2005/017}, } @InProceedings{keyboard, author={Anand, S. Abhishek and Saxena, Nitesh}, editor="Grossklags, Jens and Preneel, Bart", title="A Sound for a Sound: Mitigating Acoustic Side Channel Attacks on Password Keystrokes with Active Sounds", booktitle="Financial Cryptography and Data Security", year="2017", publisher="Springer Berlin Heidelberg", address="Berlin, Heidelberg", pages="346--364", } @INPROCEEDINGS{printer, author={Al Faruque, Mohammad Abdullah and Chhetri, Sujit Rokka and Canedo, Arquimedes and Wan, Jiang}, booktitle={2016 ACM/IEEE 7th International Conference on Cyber-Physical Systems (ICCPS)}, title={Acoustic Side-Channel Attacks on Additive Manufacturing Systems}, year={2016}, volume={}, number={}, pages={1-10}, doi={10.1109/ICCPS.2016.7479068} } @inproceedings{iot_anoamly_sca, author = {Devin Spatz and Devin Smarra and Igor Ternovskiy}, title = {{A review of anomaly detection techniques leveraging side-channel emissions}}, volume = {11011}, booktitle = {Cyber Sensing 2019}, editor = {Igor V. Ternovskiy and Peter Chin}, organization = {International Society for Optics and Photonics}, publisher = {SPIE}, pages = {48 -- 55}, keywords = {Rf emission, loT, Cyber security}, year = {2019}, doi = {10.1117/12.2521450}, URL = {https://doi.org/10.1117/12.2521450} } @INPROCEEDINGS{power-devices, author={Konstantinou, Charalambos and Maniatakos, Michail}, booktitle={2015 IEEE International Conference on Smart Grid Communications (SmartGridComm)}, title={Impact of firmware modification attacks on power systems field devices}, year={2015}, volume={}, number={}, pages={283-288}, doi={10.1109/SmartGridComm.2015.7436314} } @article{plc_firmware, title = {Firmware modification attacks on programmable logic controllers}, journal = {International Journal of Critical Infrastructure Protection}, volume = {6}, number = {2}, pages = {76-84}, year = {2013}, issn = {1874-5482}, doi = {https://doi.org/10.1016/j.ijcip.2013.04.004}, url = {https://www.sciencedirect.com/science/article/pii/S1874548213000231}, author = {Zachry Basnight and Jonathan Butts and Juan Lopez and Thomas Dube}, keywords = {Industrial control systems, Programmable logic controllers, Firmware, Modification attacks, Reverse engineering}, } @article{santamarta2012here, title={Here be backdoors: A journey into the secrets of industrial firmware}, author={Santamarta, Ruben}, journal={Black Hat USA}, year={2012} } @ARTICLE{health_review, author={Yaqoob, Tahreem and Abbas, Haider and Atiquzzaman, Mohammed}, journal={IEEE Communications Surveys Tutorials}, title={Security Vulnerabilities, Attacks, Countermeasures, and Regulations of Networked Medical Devices—A Review}, year={2019}, volume={21}, number={4}, pages={3723-3768}, doi={10.1109/COMST.2019.2914094}} @article{pacemaker, author = {Adrian Baranchuk and Bryce Alexander and Debra Campbell and Sohaib Haseeb and Damian Redfearn and Chris Simpson and Ben Glover }, title = {Pacemaker Cybersecurity}, journal = {Circulation}, volume = {138}, number = {12}, pages = {1272-1273}, year = {2018}, doi = {10.1161/CIRCULATIONAHA.118.035261}, URL = {https://www.ahajournals.org/doi/abs/10.1161/CIRCULATIONAHA.118.035261}, eprint = {https://www.ahajournals.org/doi/pdf/10.1161/CIRCULATIONAHA.118.035261} } @article{medical_case_study, author = {Ang Cui, Michael Costello and Salvatore J. Stolfo}, title = {When Firmware Modifications Attack: A Case Study of Embedded Exploitation}, journal = {20th Annual Network & Distributed System Security Symposium 2013}, year = {2013}, } @InProceedings{railway, author={B{\"a}ckman, Ronny and Oliver, Ian and Limonta, Gabriela}, editor="Casimiro, Ant{\'o}nio and Ortmeier, Frank and Schoitsch, Erwin and Bitsch, Friedemann and Ferreira, Pedro", title="Integrity Checking of Railway Interlocking Firmware", booktitle="Computer Safety, Reliability, and Security. SAFECOMP 2020 Workshops",year="2020", publisher="Springer International Publishing", address="Cham", pages="161--175",} @INPROCEEDINGS{cars, author={Nilsson, Dennis K. and Phung, Phu H. and Larson, Ulf E.}, booktitle={IET Road Transport Information and Control - RTIC 2008 and ITS United Kingdom Members' Conference}, title={Vehicle ECU classification based on safety-security characteristics}, year={2008}, volume={}, number={}, pages={1-7}, doi={10.1049/ic.2008.0810}} @article{BASNIGHT201377, title = {Firmware modification attacks on programmable logic controllers}, journal = {International Journal of Critical Infrastructure Protection}, volume = {6}, number = {2}, pages = {76-84}, year = {2013}, issn = {1874-5482}, doi = {https://doi.org/10.1016/j.ijcip.2013.04.004}, url = {https://www.sciencedirect.com/science/article/pii/S1874548213000231}, author = {Zachry Basnight and Jonathan Butts and Juan Lopez and Thomas Dube}, keywords = {Industrial control systems, Programmable logic controllers, Firmware, Modification attacks, Reverse engineering} } @INPROCEEDINGS{9065145, author={Gao, Chao and Luo, Lan and Zhang, Yue and Pearson, Bryan and Fu, Xinwen}, booktitle={2019 IEEE International Conference on Industrial Internet (ICII)}, title={Microcontroller Based IoT System Firmware Security: Case Studies}, year={2019}, volume={}, number={}, pages={200-209}, doi={10.1109/ICII.2019.00045}} @article{thrangrycats, title={Thrangrycat flaw lets attackers plant persistent backdoors on Cisco gear}, author={Cimpanu, C}, journal={Accessed: Sep}, volume={15}, pages={2019}, year={2019} } @article{hidden, title={Source Hidden for Double Blind Review}, author={Jhon Doe}, journal = {Journal}, year = {2022}, } @INPROCEEDINGS{blockchain1, author={Dhakal, Samip and Jaafar, Fehmi and Zavarsky, Pavol}, booktitle={2019 IEEE 19th International Symposium on High Assurance Systems Engineering (HASE)}, title={Private Blockchain Network for IoT Device Firmware Integrity Verification and Update}, year={2019}, volume={}, number={}, pages={164-170}, doi={10.1109/HASE.2019.00033} } @inproceedings{sca_attack, author = {Liu, Yannan and Wei, Lingxiao and Zhou, Zhe and Zhang, Kehuan and Xu, Wenyuan and Xu, Qiang}, title = {On Code Execution Tracking via Power Side-Channel}, year = {2016}, isbn = {9781450341394}, publisher = {Association for Computing Machinery}, address = {New York, NY, USA}, url = {https://doi.org/10.1145/2976749.2978299}, doi = {10.1145/2976749.2978299}, booktitle = {Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security}, pages = {1019–1031}, numpages = {13}, keywords = {code execution tracking, power side-channel, embedded system, hardware security}, location = {Vienna, Austria}, series = {CCS '16} } @INPROCEEDINGS{7928948, author={Krishnankutty, Deepak and Robucci, Ryan and Banerjee, Nilanjan and Patel, Chintan}, booktitle={2017 IEEE 35th VLSI Test Symposium (VTS)}, title={Fiscal: Firmware identification using side-channel power analysis}, year={2017}, volume={}, number={}, pages={1-6}, doi={10.1109/VTS.2017.7928948}} @inproceedings{ssd_firmware, author = {Brown, Dane and Walker, Owens and Rakvic, Ryan and Ives, Robert W. and Ngo, Hau and Shey, James and Blanco, Justin}, title = {Towards Detection of Modified Firmware on Solid State Drives via Side Channel Analysis}, year = {2018}, isbn = {9781450364751}, publisher = {Association for Computing Machinery}, address = {New York, NY, USA}, url = {https://doi.org/10.1145/3240302.3285860}, doi = {10.1145/3240302.3285860}, booktitle = {Proceedings of the International Symposium on Memory Systems}, pages = {315–320}, numpages = {6}, keywords = {firmware, security, classification, embedded systems}, location = {Alexandria, Virginia, USA}, series = {MEMSYS '18} } @article{timing, title = {Using timing-based side channels for anomaly detection in industrial control systems}, journal = {International Journal of Critical Infrastructure Protection}, volume = {15}, pages = {12-26}, year = {2016}, issn = {1874-5482}, doi = {https://doi.org/10.1016/j.ijcip.2016.07.003}, url = {https://www.sciencedirect.com/science/article/pii/S1874548216301111}, author = {Stephen Dunlap and Jonathan Butts and Juan Lopez and Mason Rice and Barry Mullins}, } @INPROCEEDINGS{DTU, author={Xu, Aidong and Jiang, Yixin and Cao, Yang and Zhang, Guoming and Ji, Xiaoyu and Xu, Wenyuan}, booktitle={2019 IEEE 3rd Conference on Energy Internet and Energy System Integration (EI2)}, title={ADDP: Anomaly Detection for DTU Based on Power Consumption Side-Channel}, year={2019}, volume={}, number={}, pages={2659-2663}, doi={10.1109/EI247390.2019.9062014}} @inproceedings {wud, author = {Shane S. Clark and Benjamin Ransford and Amir Rahmati and Shane Guineau and Jacob Sorber and Wenyuan Xu and Kevin Fu}, title = {{WattsUpDoc}: Power Side Channels to Nonintrusively Discover Untargeted Malware on Embedded Medical Devices}, booktitle = {2013 USENIX Workshop on Health Information Technologies (HealthTech 13)}, year = {2013}, address = {Washington, D.C.}, url = {https://www.usenix.org/conference/healthtech13/workshop-program/presentation/clark}, publisher = {USENIX Association}, month = aug, } @dataset{dataset, author = {Anonymous}, title = {Dataset of bootup power consumption traces for four networking equipments.}, month = apr, year = 2022, publisher = {Zenodo}, doi = {10.5281/zenodo.6419214}, url = {https://doi.org/10.5281/zenodo.6419214} } @book{han2011data, title={Data mining: concepts and techniques}, author={Han, Jiawei and Pei, Jian and Kamber, Micheline}, year={2011}, publisher={Elsevier} } @article{zimmering2021generating, title={Generating Artificial Sensor Data for the Comparison of Unsupervised Machine Learning Methods}, author={Zimmering, Bernd and Niggemann, Oliver and Hasterok, Constanze and Pfannstiel, Erik and Ramming, Dario and Pfrommer, Julius}, journal={Sensors}, volume={21}, number={7}, pages={2397}, year={2021}, publisher={Multidisciplinary Digital Publishing Institute} } @INPROCEEDINGS{8326960, author={Dey, Vishal and Pudi, Vikramkumar and Chattopadhyay, Anupam and Elovici, Yuval}, booktitle={2018 31st International Conference on VLSI Design and 2018 17th International Conference on Embedded Systems (VLSID)}, title={Security Vulnerabilities of Unmanned Aerial Vehicles and Countermeasures: An Experimental Study}, year={2018}, volume={}, number={}, pages={398-403}, doi={10.1109/VLSID.2018.97} } @INPROCEEDINGS{8433205, author={Chen, Wenxin and Dong, Yingfei and Duan, Zhenhai}, booktitle={2018 IEEE Conference on Communications and Network Security (CNS)}, title={Manipulating Drone Dynamic State Estimation to Compromise Navigation}, year={2018}, volume={}, number={}, pages={1-9}, doi={10.1109/CNS.2018.8433205} } @ARTICLE{8556480, author={Bisio, Igor and Garibotto, Chiara and Lavagetto, Fabio and Sciarrone, Andrea and Zappatore, Sandro}, journal={IEEE Transactions on Vehicular Technology}, title={Blind Detection: Advanced Techniques for WiFi-Based Drone Surveillance}, year={2019}, volume={68}, number={1}, pages={938-946}, doi={10.1109/TVT.2018.2884767} }