@online{cve-firmware, author = {mitre.org}, title = {cve.mitre.org}, year = 2021, url = {https://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=Firmware}, urldate = {2021-12-7} } @article{BASNIGHT201376, title = {Firmware modification attacks on programmable logic controllers}, journal = {International Journal of Critical Infrastructure Protection}, volume = {6}, number = {2}, pages = {76-84}, year = {2013}, issn = {1874-5482}, doi = {https://doi.org/10.1016/j.ijcip.2013.04.004}, url = {https://www.sciencedirect.com/science/article/pii/S1874548213000231}, author = {Zachry Basnight and Jonathan Butts and Juan Lopez and Thomas Dube}, } @misc{rieck2016attacks, title={Attacks on Fitness Trackers Revisited: A Case-Study of Unfit Firmware Security}, author={Jakob Rieck}, year={2016}, eprint={1604.03313}, archivePrefix={arXiv}, primaryClass={cs.CR} } @inproceedings {185175, author = {Jacob Maskiewicz and Benjamin Ellis and James Mouradian and Hovav Shacham}, title = {Mouse Trap: Exploiting Firmware Updates in {USB} Peripherals}, booktitle = {8th USENIX Workshop on Offensive Technologies ({WOOT} 14)}, year = {2014}, address = {San Diego, CA}, url = {https://www.usenix.org/conference/woot14/workshop-program/presentation/maskiewicz}, publisher = {USENIX Association}, month = aug, } @online{usb_killer, author = {Dark Purple }, title = {USB Killer}, year = 2021, url = {https://kukuruku.co/post/usb-killer/}, urldate = {2021-12-18} } @online{lan_turtle, author = {Hack5}, title = {LAN Turtle}, year = 2021, url = {https://hak5.org/collections/sale/products/lan-turtle}, urldate = {2021-12-18} } @online{rubber_ducky, author = {Hack5}, title = {Rubber Ducky}, year = 2021, url = {https://hak5.org/collections/sale/products/usb-rubber-ducky-deluxe}, urldate = {2021-12-18} } @online{key_croc, author = {Hack5}, title = {Key Coc}, year = 2021, url = {https://hak5.org/collections/sale/products/key-croc}, urldate = {2021-12-18} } @online{minio, author = {MinIO}, title = {MinIO}, year = 2021, url = {https://min.io/}, urldate = {2021-12-18} } @INPROCEEDINGS{firmware_blockchain, author={Lim, Jea-Min and Kim, Youngpil and Yoo, Chuck}, booktitle={2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData)}, title={Chain Veri: Blockchain-Based Firmware Verification System for IoT Environment}, year={2018}, volume={}, number={}, pages={1050-1056}, doi={10.1109/Cybermatics_2018.2018.00194} } @InProceedings{firmware_blockchain_2, author={Lee, Boohyung and Malik, Sehrish and Wi, Sarang and Lee, Jong-Hyouk}, editor="Lee, Jong-Hyouk and Pack, Sangheon", title="Firmware Verification of Embedded Devices Based on a Blockchain", booktitle="Quality, Reliability, Security and Robustness in Heterogeneous Networks", year="2017", publisher="Springer International Publishing", address="Cham", pages="52--61", isbn="978-3-319-60717-7" } @InProceedings{firmware_data, author={McMinn, Lucille and Butts, Jonathan}, editor="Butts, Jonathan and Shenoi, Sujeet", title="A Firmware Verification Tool for Programmable Logic Controllers", booktitle="Critical Infrastructure Protection VI", year="2012", publisher="Springer Berlin Heidelberg", address="Berlin, Heidelberg", pages="59--69", isbn="978-3-642-35764-0" } @INPROCEEDINGS{firmware_crypto, author={Nilsson, Dennis K. and Sun, Lei and Nakajima, Tatsuo}, booktitle={2008 IEEE Globecom Workshops}, title={A Framework for Self-Verification of Firmware Updates over the Air in Vehicle ECUs}, year={2008}, volume={}, number={}, pages={1-5}, doi={10.1109/GLOCOMW.2008.ECP.56} } @InProceedings{firmware_sign, author={Jeong, Eunseon and Park, Junyoung and Son, Byeonggeun and Kim, Myoungsu and Yim, Kangbin}, editor={Barolli, Leonard and Xhafa, Fatos and Javaid, Nadeem and Enokido, Tomoya}, title={Study on Signature Verification Process for the Firmware of an Android Platform}, booktitle="Innovative Mobile and Internet Services in Ubiquitous Computing", year="2019", publisher="Springer International Publishing", address="Cham", pages="540--545", isbn="978-3-319-93554-6" } @misc{mitre, title = {MITRE ATT&CK® T1542.001 Pre-OS Boot: System Firmware}, howpublished = {https://attack.mitre.org/versions/v10/techniques/T1542/001/}, note = {Accessed: 2022-03-31} } @misc{capec, title = {CAPEC-532: Altered Installed BIOS}, howpublished = {https://capec.mitre.org/data/definitions/532.html}, note = {Accessed: 2022-03-31} } @misc{coreboot, title = {Coreboot. Fast, secure and flexible OpenSource firmware}, howpublished = {https://www.coreboot.org/}, note = {Accessed: 2022-03-31} } @misc{owrt, title = {OpenWrt}, howpublished = {https://openwrt.org/}, note = {Accessed: 2022-03-31} } @misc{ddwrt, title = {DD-WRT}, howpublished = {https://dd-wrt.com/}, note = {Accessed: 2022-03-31} } @misc{freshtomato, title = {FreshTomato}, howpublished = {https://www.freshtomato.org/}, note = {Accessed: 2022-03-31} } @misc{droneincrease, title= {Futur of Drone Industry}, howpublished ={https://www.strategicmarketresearch.com/blogs/drone-industry-future}, note={accessed: 2023-06} } @misc{trustanchor, title = {Cisco's Trustworthy Technology Datasheet}, howpublished = {https://www.cisco.com/c/dam/en_us/about/doing_business/trust-center/docs/trustworthy-technologies-datasheet.pdf}, note = {Accessed: 2022-04-06} } @misc{downtime, title = {How to Calculate Data Center Downtime}, howpublished = {https://datacenterfrontier.com/how-calculate-data-center-downtime/}, note = {Accessed: 2022-04-06} } @misc{cryptoreview, author = {YongBin Zhou and DengGuo Feng}, title = {Side-Channel Attacks: Ten Years After Its Publication and the Impacts on Cryptographic Module Security Testing}, howpublished = {Cryptology ePrint Archive, Report 2005/388}, year = {2005}, note = {https://ia.cr/2005/388}, } @misc{curveattack, author = {Roberto M. Avanzi}, title = {Side Channel Attacks on Implementations of Curve-Based Cryptographic Primitives}, howpublished = {Cryptology ePrint Archive, Report 2005/017}, year = {2005}, note = {https://ia.cr/2005/017}, } @InProceedings{keyboard, author={Anand, S. Abhishek and Saxena, Nitesh}, editor="Grossklags, Jens and Preneel, Bart", title="A Sound for a Sound: Mitigating Acoustic Side Channel Attacks on Password Keystrokes with Active Sounds", booktitle="Financial Cryptography and Data Security", year="2017", publisher="Springer Berlin Heidelberg", address="Berlin, Heidelberg", pages="346--364", } @INPROCEEDINGS{printer, author={Al Faruque, Mohammad Abdullah and Chhetri, Sujit Rokka and Canedo, Arquimedes and Wan, Jiang}, booktitle={2016 ACM/IEEE 7th International Conference on Cyber-Physical Systems (ICCPS)}, title={Acoustic Side-Channel Attacks on Additive Manufacturing Systems}, year={2016}, volume={}, number={}, pages={1-10}, doi={10.1109/ICCPS.2016.7479068} } @inproceedings{iot_anoamly_sca, author = {Devin Spatz and Devin Smarra and Igor Ternovskiy}, title = {{A review of anomaly detection techniques leveraging side-channel emissions}}, volume = {11011}, booktitle = {Cyber Sensing 2019}, editor = {Igor V. Ternovskiy and Peter Chin}, organization = {International Society for Optics and Photonics}, publisher = {SPIE}, pages = {48 -- 55}, keywords = {Rf emission, loT, Cyber security}, year = {2019}, doi = {10.1117/12.2521450}, URL = {https://doi.org/10.1117/12.2521450} } @INPROCEEDINGS{power-devices, author={Konstantinou, Charalambos and Maniatakos, Michail}, booktitle={2015 IEEE International Conference on Smart Grid Communications (SmartGridComm)}, title={Impact of firmware modification attacks on power systems field devices}, year={2015}, volume={}, number={}, pages={283-288}, doi={10.1109/SmartGridComm.2015.7436314} } @article{plc_firmware, title = {Firmware modification attacks on programmable logic controllers}, journal = {International Journal of Critical Infrastructure Protection}, volume = {6}, number = {2}, pages = {76-84}, year = {2013}, issn = {1874-5482}, doi = {https://doi.org/10.1016/j.ijcip.2013.04.004}, url = {https://www.sciencedirect.com/science/article/pii/S1874548213000231}, author = {Zachry Basnight and Jonathan Butts and Juan Lopez and Thomas Dube}, keywords = {Industrial control systems, Programmable logic controllers, Firmware, Modification attacks, Reverse engineering}, } @article{santamarta2012here, title={Here be backdoors: A journey into the secrets of industrial firmware}, author={Santamarta, Ruben}, journal={Black Hat USA}, year={2012} } @ARTICLE{health_review, author={Yaqoob, Tahreem and Abbas, Haider and Atiquzzaman, Mohammed}, journal={IEEE Communications Surveys Tutorials}, title={Security Vulnerabilities, Attacks, Countermeasures, and Regulations of Networked Medical Devices—A Review}, year={2019}, volume={21}, number={4}, pages={3723-3768}, doi={10.1109/COMST.2019.2914094}} @article{pacemaker, author = {Adrian Baranchuk and Bryce Alexander and Debra Campbell and Sohaib Haseeb and Damian Redfearn and Chris Simpson and Ben Glover }, title = {Pacemaker Cybersecurity}, journal = {Circulation}, volume = {138}, number = {12}, pages = {1272-1273}, year = {2018}, doi = {10.1161/CIRCULATIONAHA.118.035261}, URL = {https://www.ahajournals.org/doi/abs/10.1161/CIRCULATIONAHA.118.035261}, eprint = {https://www.ahajournals.org/doi/pdf/10.1161/CIRCULATIONAHA.118.035261} } @article{medical_case_study, author = {Ang Cui, Michael Costello and Salvatore J. Stolfo}, title = {When Firmware Modifications Attack: A Case Study of Embedded Exploitation}, journal = {20th Annual Network & Distributed System Security Symposium 2013}, year = {2013}, } @InProceedings{railway, author={B{\"a}ckman, Ronny and Oliver, Ian and Limonta, Gabriela}, editor="Casimiro, Ant{\'o}nio and Ortmeier, Frank and Schoitsch, Erwin and Bitsch, Friedemann and Ferreira, Pedro", title="Integrity Checking of Railway Interlocking Firmware", booktitle="Computer Safety, Reliability, and Security. SAFECOMP 2020 Workshops",year="2020", publisher="Springer International Publishing", address="Cham", pages="161--175",} @INPROCEEDINGS{cars, author={Nilsson, Dennis K. and Phung, Phu H. and Larson, Ulf E.}, booktitle={IET Road Transport Information and Control - RTIC 2008 and ITS United Kingdom Members' Conference}, title={Vehicle ECU classification based on safety-security characteristics}, year={2008}, volume={}, number={}, pages={1-7}, doi={10.1049/ic.2008.0810}} @article{BASNIGHT201377, title = {Firmware modification attacks on programmable logic controllers}, journal = {International Journal of Critical Infrastructure Protection}, volume = {6}, number = {2}, pages = {76-84}, year = {2013}, issn = {1874-5482}, doi = {https://doi.org/10.1016/j.ijcip.2013.04.004}, url = {https://www.sciencedirect.com/science/article/pii/S1874548213000231}, author = {Zachry Basnight and Jonathan Butts and Juan Lopez and Thomas Dube}, keywords = {Industrial control systems, Programmable logic controllers, Firmware, Modification attacks, Reverse engineering} } @INPROCEEDINGS{9065145, author={Gao, Chao and Luo, Lan and Zhang, Yue and Pearson, Bryan and Fu, Xinwen}, booktitle={2019 IEEE International Conference on Industrial Internet (ICII)}, title={Microcontroller Based IoT System Firmware Security: Case Studies}, year={2019}, volume={}, number={}, pages={200-209}, doi={10.1109/ICII.2019.00045}} @article{thrangrycats, title={Thrangrycat flaw lets attackers plant persistent backdoors on Cisco gear}, author={Cimpanu, C}, journal={Accessed: Sep}, volume={15}, pages={2019}, year={2019} } @article{hidden, title={Source Hidden for Double Blind Review}, author={Jhon Doe}, journal = {Journal}, year = {2022}, } @misc{palitronica, title = {Palitronica - Palisade}, howpublished = {https://www.palitronica.com/products/palisade}, note = {Accessed: 2010-03-26} } @INPROCEEDINGS{blockchain1, author={Dhakal, Samip and Jaafar, Fehmi and Zavarsky, Pavol}, booktitle={2019 IEEE 19th International Symposium on High Assurance Systems Engineering (HASE)}, title={Private Blockchain Network for IoT Device Firmware Integrity Verification and Update}, year={2019}, volume={}, number={}, pages={164-170}, doi={10.1109/HASE.2019.00033} } @inproceedings{sca_attack, author = {Liu, Yannan and Wei, Lingxiao and Zhou, Zhe and Zhang, Kehuan and Xu, Wenyuan and Xu, Qiang}, title = {On Code Execution Tracking via Power Side-Channel}, year = {2016}, isbn = {9781450341394}, publisher = {Association for Computing Machinery}, address = {New York, NY, USA}, url = {https://doi.org/10.1145/2976749.2978299}, doi = {10.1145/2976749.2978299}, booktitle = {Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security}, pages = {1019–1031}, numpages = {13}, keywords = {code execution tracking, power side-channel, embedded system, hardware security}, location = {Vienna, Austria}, series = {CCS '16} } @INPROCEEDINGS{7928948, author={Krishnankutty, Deepak and Robucci, Ryan and Banerjee, Nilanjan and Patel, Chintan}, booktitle={2017 IEEE 35th VLSI Test Symposium (VTS)}, title={Fiscal: Firmware identification using side-channel power analysis}, year={2017}, volume={}, number={}, pages={1-6}, doi={10.1109/VTS.2017.7928948}} @inproceedings{ssd_firmware, author = {Brown, Dane and Walker, Owens and Rakvic, Ryan and Ives, Robert W. and Ngo, Hau and Shey, James and Blanco, Justin}, title = {Towards Detection of Modified Firmware on Solid State Drives via Side Channel Analysis}, year = {2018}, isbn = {9781450364751}, publisher = {Association for Computing Machinery}, address = {New York, NY, USA}, url = {https://doi.org/10.1145/3240302.3285860}, doi = {10.1145/3240302.3285860}, booktitle = {Proceedings of the International Symposium on Memory Systems}, pages = {315–320}, numpages = {6}, keywords = {firmware, security, classification, embedded systems}, location = {Alexandria, Virginia, USA}, series = {MEMSYS '18} } @article{timing, title = {Using timing-based side channels for anomaly detection in industrial control systems}, journal = {International Journal of Critical Infrastructure Protection}, volume = {15}, pages = {12-26}, year = {2016}, issn = {1874-5482}, doi = {https://doi.org/10.1016/j.ijcip.2016.07.003}, url = {https://www.sciencedirect.com/science/article/pii/S1874548216301111}, author = {Stephen Dunlap and Jonathan Butts and Juan Lopez and Mason Rice and Barry Mullins}, } @INPROCEEDINGS{DTU, author={Xu, Aidong and Jiang, Yixin and Cao, Yang and Zhang, Guoming and Ji, Xiaoyu and Xu, Wenyuan}, booktitle={2019 IEEE 3rd Conference on Energy Internet and Energy System Integration (EI2)}, title={ADDP: Anomaly Detection for DTU Based on Power Consumption Side-Channel}, year={2019}, volume={}, number={}, pages={2659-2663}, doi={10.1109/EI247390.2019.9062014}} @inproceedings {wud, author = {Shane S. Clark and Benjamin Ransford and Amir Rahmati and Shane Guineau and Jacob Sorber and Wenyuan Xu and Kevin Fu}, title = {{WattsUpDoc}: Power Side Channels to Nonintrusively Discover Untargeted Malware on Embedded Medical Devices}, booktitle = {2013 USENIX Workshop on Health Information Technologies (HealthTech 13)}, year = {2013}, address = {Washington, D.C.}, url = {https://www.usenix.org/conference/healthtech13/workshop-program/presentation/clark}, publisher = {USENIX Association}, month = aug, } @dataset{dataset, author = {Anonymous}, title = {Dataset of bootup power consumption traces for four networking equipments.}, month = apr, year = 2022, publisher = {Zenodo}, doi = {10.5281/zenodo.6419214}, url = {https://doi.org/10.5281/zenodo.6419214} } @book{han2011data, title={Data mining: concepts and techniques}, author={Han, Jiawei and Pei, Jian and Kamber, Micheline}, year={2011}, publisher={Elsevier} } @article{zimmering2021generating, title={Generating Artificial Sensor Data for the Comparison of Unsupervised Machine Learning Methods}, author={Zimmering, Bernd and Niggemann, Oliver and Hasterok, Constanze and Pfannstiel, Erik and Ramming, Dario and Pfrommer, Julius}, journal={Sensors}, volume={21}, number={7}, pages={2397}, year={2021}, publisher={Multidisciplinary Digital Publishing Institute} } @INPROCEEDINGS{8326960, author={Dey, Vishal and Pudi, Vikramkumar and Chattopadhyay, Anupam and Elovici, Yuval}, booktitle={2018 31st International Conference on VLSI Design and 2018 17th International Conference on Embedded Systems (VLSID)}, title={Security Vulnerabilities of Unmanned Aerial Vehicles and Countermeasures: An Experimental Study}, year={2018}, volume={}, number={}, pages={398-403}, doi={10.1109/VLSID.2018.97} } @INPROCEEDINGS{8433205, author={Chen, Wenxin and Dong, Yingfei and Duan, Zhenhai}, booktitle={2018 IEEE Conference on Communications and Network Security (CNS)}, title={Manipulating Drone Dynamic State Estimation to Compromise Navigation}, year={2018}, volume={}, number={}, pages={1-9}, doi={10.1109/CNS.2018.8433205} } @ARTICLE{8556480, author={Bisio, Igor and Garibotto, Chiara and Lavagetto, Fabio and Sciarrone, Andrea and Zappatore, Sandro}, journal={IEEE Transactions on Vehicular Technology}, title={Blind Detection: Advanced Techniques for WiFi-Based Drone Surveillance}, year={2019}, volume={68}, number={1}, pages={938-946}, doi={10.1109/TVT.2018.2884767} } @inproceedings{clark_current_2013, address = {Berlin, Heidelberg}, series = {Lecture {Notes} in {Computer} {Science}}, title = {Current {Events}: {Identifying} {Webpages} by {Tapping} the {Electrical} {Outlet}}, isbn = {978-3-642-40203-6}, shorttitle = {Current {Events}}, doi = {10.1007/978-3-642-40203-6_39}, abstract = {Computers plugged into power outlets leak identifiable information by drawing variable amounts of power when performing different tasks. This work examines the extent to which this side channel leaks private information about web browsing to an observer taking measurements at the power outlet. Using direct measurements of AC power consumption with an instrumented outlet, we construct a classifier that correctly identifies unlabeled power traces of webpage activity from a set of 51 candidates with 99\% precision and 99\% recall. The classifier rejects samples of 441 pages outside the corpus with a false-positive rate of less than 2\%. It is also robust to a number of variations in webpage loading conditions, including encryption. When trained on power traces from two computers loading the same webpage, the classifier correctly labels further traces of that webpage from either computer. We identify several reasons for this consistently recognizable power consumption, including system calls, and propose countermeasures to limit the leakage of private information. Characterizing the AC power side channel may help lead to practical countermeasures that protect user privacy from an untrustworthy power infrastructure.}, language = {en}, booktitle = {Computer {Security} – {ESORICS} 2013}, publisher = {Springer}, author = {Clark, Shane S. and Mustafa, Hossen and Ransford, Benjamin and Sorber, Jacob and Fu, Kevin and Xu, Wenyuan}, editor = {Crampton, Jason and Jajodia, Sushil and Mayes, Keith}, year = {2013}, keywords = {Background Process, Parasitic Modulation, Power Consumption, Side Channel, Threat Model}, pages = {700--717}, file = {Full Text PDF:/home/grizzly/Zotero/storage/YCPP3Y6C/Clark et al. - 2013 - Current Events Identifying Webpages by Tapping th.pdf:application/pdf}, } @inproceedings{10.1145-2899007.2899009, author = {Conti, Mauro and Nati, Michele and Rotundo, Enrico and Spolaor, Riccardo}, title = {Mind The Plug! Laptop-User Recognition Through Power Consumption}, year = {2016}, isbn = {9781450342834}, publisher = {Association for Computing Machinery}, address = {New York, NY, USA}, url = {https://doi.org/10.1145/2899007.2899009}, doi = {10.1145/2899007.2899009}, abstract = {The Internet of Things (IoT) paradigm, in conjunction with the one of smart cities, is pursuing toward the concept of smart buildings, i.e., ``intelligent'' buildings able to receive data from a network of sensors and thus to adapt the environment. IoT sensors can monitor a wide range of environmental features such as the energy consumption inside a building at fine-grained level (e.g., for a specific wall-socket). Some smart buildings already deploy energy monitoring in order to optimize the energy use for good purposes (e.g., to save money, to reduce pollution). Unfortunately, such measurements raise a significant amount of privacy concerns.In this paper, we investigate the feasibility of recognizing the pair laptop-user (i.e., a user using her own laptop) from the energy traces produced by her laptop. We design MTPlug, a framework that achieves this goal relying on supervised machine learning techniques as pattern recognition in multivariate time series. We present a comprehensive implementation of this system and run a thorough set of experiments. In particular, we collected data by monitoring the energy consumption of two groups of laptop users, some office employees and some intruders, for a total of 27 people. We show that our system is able to build an energy profile for a laptop user with accuracy above 80%, in less than 3.5 hours of laptop usage. To the best of our knowledge, this is the first research that assesses the feasibility of laptop users profiling relying uniquely on fine-grained energy traces collected using wall-socket smart meters.}, booktitle = {Proceedings of the 2nd ACM International Workshop on IoT Privacy, Trust, and Security}, pages = {37–44}, numpages = {8}, keywords = {internet of things, energy consumption., smart meter, user identification, smart building, machine learning, intrusion detection}, location = {Xi'an, China}, series = {IoTPTS '16} } @inproceedings{michalevsky2015powerspy, title={Powerspy: Location tracking using mobile device power analysis}, author={Michalevsky, Yan and Schulman, Aaron and Veerapandian, Gunaa Arumugam and Boneh, Dan and Nakibly, Gabi}, booktitle={24th USENIX Security Symposium (USENIX Security 15)}, pages={785--800}, year={2015} } @INPROCEEDINGS{4531926, author={Nilsson, D. K. and Larson, U. E.}, booktitle={ICC Workshops - 2008 IEEE International Conference on Communications Workshops}, title={Secure Firmware Updates over the Air in Intelligent Vehicles}, year={2008}, volume={}, number={}, pages={380-384}, doi={10.1109/ICCW.2008.78}} @INPROCEEDINGS{8726545, author={Kolehmainen, Antti}, booktitle={2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData)}, title={Secure Firmware Updates for IoT: A Survey}, year={2018}, volume={}, number={}, pages={112-117}, doi={10.1109/Cybermatics_2018.2018.00051}} @INPROCEEDINGS{8855288, author={Hernandez Jimenez, Jarilyn and Goseva-Popstojanova, Katerina}, booktitle={2019 2nd International Conference on Data Intelligence and Security (ICDIS)}, title={Malware Detection Using Power Consumption and Network Traffic Data}, year={2019}, volume={}, number={}, pages={53-59}, doi={10.1109/ICDIS.2019.00016}} @inproceedings{pothukuchi2021maya, title={Maya: Using formal control to obfuscate power side channels}, author={Pothukuchi, Raghavendra Pradyumna and Pothukuchi, Sweta Yamini and Voulgaris, Petros G and Schwing, Alexander and Torrellas, Josep}, booktitle={2021 ACM/IEEE 48th Annual International Symposium on Computer Architecture (ISCA)}, pages={888--901}, year={2021}, organization={IEEE} } @misc{sun2017revisiting, title={Revisiting Unreasonable Effectiveness of Data in Deep Learning Era}, author={Chen Sun and Abhinav Shrivastava and Saurabh Singh and Abhinav Gupta}, year={2017}, eprint={1707.02968}, archivePrefix={arXiv}, primaryClass={cs.CV} }