deneir/BPV/qrs/bibli.bib
Arthur Grisel-Davy 6dff086d6c backup typst
2023-06-19 15:49:07 -04:00

486 lines
17 KiB
BibTeX
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

@online{cve-firmware,
author = {mitre.org},
title = {cve.mitre.org},
year = 2021,
url = {https://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=Firmware},
urldate = {2021-12-7}
}
@article{BASNIGHT201376,
title = {Firmware modification attacks on programmable logic controllers},
journal = {International Journal of Critical Infrastructure Protection},
volume = {6},
number = {2},
pages = {76-84},
year = {2013},
issn = {1874-5482},
doi = {https://doi.org/10.1016/j.ijcip.2013.04.004},
url = {https://www.sciencedirect.com/science/article/pii/S1874548213000231},
author = {Zachry Basnight and Jonathan Butts and Juan Lopez and Thomas Dube},
}
@misc{rieck2016attacks,
title={Attacks on Fitness Trackers Revisited: A Case-Study of Unfit Firmware Security},
author={Jakob Rieck},
year={2016},
eprint={1604.03313},
archivePrefix={arXiv},
primaryClass={cs.CR}
}
@inproceedings {185175,
author = {Jacob Maskiewicz and Benjamin Ellis and James Mouradian and Hovav Shacham},
title = {Mouse Trap: Exploiting Firmware Updates in {USB} Peripherals},
booktitle = {8th {USENIX} Workshop on Offensive Technologies ({WOOT} 14)},
year = {2014},
address = {San Diego, CA},
url = {https://www.usenix.org/conference/woot14/workshop-program/presentation/maskiewicz},
publisher = {{USENIX} Association},
month = aug,
}
@online{usb_killer,
author = {Dark Purple },
title = {USB Killer},
year = 2021,
url = {https://kukuruku.co/post/usb-killer/},
urldate = {2021-12-18}
}
@online{lan_turtle,
author = {Hack5},
title = {LAN Turtle},
year = 2021,
url = {https://hak5.org/collections/sale/products/lan-turtle},
urldate = {2021-12-18}
}
@online{rubber_ducky,
author = {Hack5},
title = {Rubber Ducky},
year = 2021,
url = {https://hak5.org/collections/sale/products/usb-rubber-ducky-deluxe},
urldate = {2021-12-18}
}
@online{key_croc,
author = {Hack5},
title = {Key Coc},
year = 2021,
url = {https://hak5.org/collections/sale/products/key-croc},
urldate = {2021-12-18}
}
@online{minio,
author = {MinIO},
title = {MinIO},
year = 2021,
url = {https://min.io/},
urldate = {2021-12-18}
}
@INPROCEEDINGS{firmware_blockchain,
author={Lim, Jea-Min and Kim, Youngpil and Yoo, Chuck},
booktitle={2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData)},
title={Chain Veri: Blockchain-Based Firmware Verification System for IoT Environment},
year={2018},
volume={},
number={},
pages={1050-1056},
doi={10.1109/Cybermatics_2018.2018.00194}
}
@InProceedings{firmware_blockchain_2,
author={Lee, Boohyung and Malik, Sehrish and Wi, Sarang and Lee, Jong-Hyouk},
editor="Lee, Jong-Hyouk
and Pack, Sangheon",
title="Firmware Verification of Embedded Devices Based on a Blockchain",
booktitle="Quality, Reliability, Security and Robustness in Heterogeneous Networks",
year="2017",
publisher="Springer International Publishing",
address="Cham",
pages="52--61",
isbn="978-3-319-60717-7"
}
@InProceedings{firmware_data,
author={McMinn, Lucille and Butts, Jonathan},
editor="Butts, Jonathan
and Shenoi, Sujeet",
title="A Firmware Verification Tool for Programmable Logic Controllers",
booktitle="Critical Infrastructure Protection VI",
year="2012",
publisher="Springer Berlin Heidelberg",
address="Berlin, Heidelberg",
pages="59--69",
isbn="978-3-642-35764-0"
}
@INPROCEEDINGS{firmware_crypto,
author={Nilsson, Dennis K. and Sun, Lei and Nakajima, Tatsuo},
booktitle={2008 IEEE Globecom Workshops},
title={A Framework for Self-Verification of Firmware Updates over the Air in Vehicle ECUs},
year={2008},
volume={},
number={},
pages={1-5},
doi={10.1109/GLOCOMW.2008.ECP.56}
}
@InProceedings{firmware_sign,
author={Jeong, Eunseon and Park, Junyoung and Son, Byeonggeun and Kim, Myoungsu and Yim, Kangbin},
editor={Barolli, Leonard and Xhafa, Fatos and Javaid, Nadeem and Enokido, Tomoya},
title={Study on Signature Verification Process for the Firmware of an Android Platform},
booktitle="Innovative Mobile and Internet Services in Ubiquitous Computing",
year="2019",
publisher="Springer International Publishing",
address="Cham",
pages="540--545",
isbn="978-3-319-93554-6"
}
@misc{mitre,
title = {MITRE ATT&CK® T1542.001 Pre-OS Boot: System Firmware},
howpublished = {https://attack.mitre.org/versions/v10/techniques/T1542/001/},
note = {Accessed: 2022-03-31}
}
@misc{capec,
title = {CAPEC-532: Altered Installed BIOS},
howpublished = {https://capec.mitre.org/data/definitions/532.html},
note = {Accessed: 2022-03-31}
}
@misc{coreboot,
title = {Coreboot. Fast, secure and flexible OpenSource firmware},
howpublished = {https://www.coreboot.org/},
note = {Accessed: 2022-03-31}
}
@misc{owrt,
title = {OpenWrt},
howpublished = {https://openwrt.org/},
note = {Accessed: 2022-03-31}
}
@misc{ddwrt,
title = {DD-WRT},
howpublished = {https://dd-wrt.com/},
note = {Accessed: 2022-03-31}
}
@misc{freshtomato,
title = {FreshTomato},
howpublished = {https://www.freshtomato.org/},
note = {Accessed: 2022-03-31}
}
@misc{droneincrease,
title= {Futur of Drone Industry},
howpublished ={https://www.strategicmarketresearch.com/blogs/drone-industry-future},
note={accessed: 2023-06}
}
@misc{trustanchor,
title = {Cisco's Trustworthy Technology Datasheet},
howpublished = {https://www.cisco.com/c/dam/en_us/about/doing_business/trust-center/docs/trustworthy-technologies-datasheet.pdf},
note = {Accessed: 2022-04-06}
}
@misc{downtime,
title = {How to Calculate Data Center Downtime},
howpublished = {https://datacenterfrontier.com/how-calculate-data-center-downtime/},
note = {Accessed: 2022-04-06}
}
@misc{cryptoreview,
author = {YongBin Zhou and DengGuo Feng},
title = {Side-Channel Attacks: Ten Years After Its Publication and the Impacts on Cryptographic Module Security Testing},
howpublished = {Cryptology ePrint Archive, Report 2005/388},
year = {2005},
note = {https://ia.cr/2005/388},
}
@misc{curveattack,
author = {Roberto M. Avanzi},
title = {Side Channel Attacks on Implementations of Curve-Based Cryptographic Primitives},
howpublished = {Cryptology ePrint Archive, Report 2005/017},
year = {2005},
note = {https://ia.cr/2005/017},
}
@InProceedings{keyboard,
author={Anand, S. Abhishek and Saxena, Nitesh},
editor="Grossklags, Jens
and Preneel, Bart",
title="A Sound for a Sound: Mitigating Acoustic Side Channel Attacks on Password Keystrokes with Active Sounds",
booktitle="Financial Cryptography and Data Security",
year="2017",
publisher="Springer Berlin Heidelberg",
address="Berlin, Heidelberg",
pages="346--364",
}
@INPROCEEDINGS{printer,
author={Al Faruque, Mohammad Abdullah and Chhetri, Sujit Rokka and Canedo, Arquimedes and Wan, Jiang},
booktitle={2016 ACM/IEEE 7th International Conference on Cyber-Physical Systems (ICCPS)},
title={Acoustic Side-Channel Attacks on Additive Manufacturing Systems},
year={2016},
volume={},
number={},
pages={1-10},
doi={10.1109/ICCPS.2016.7479068}
}
@inproceedings{iot_anoamly_sca,
author = {Devin Spatz and Devin Smarra and Igor Ternovskiy},
title = {{A review of anomaly detection techniques leveraging side-channel emissions}},
volume = {11011},
booktitle = {Cyber Sensing 2019},
editor = {Igor V. Ternovskiy and Peter Chin},
organization = {International Society for Optics and Photonics},
publisher = {SPIE},
pages = {48 -- 55},
keywords = {Rf emission, loT, Cyber security},
year = {2019},
doi = {10.1117/12.2521450},
URL = {https://doi.org/10.1117/12.2521450}
}
@INPROCEEDINGS{power-devices,
author={Konstantinou, Charalambos and Maniatakos, Michail},
booktitle={2015 IEEE International Conference on Smart Grid Communications (SmartGridComm)},
title={Impact of firmware modification attacks on power systems field devices},
year={2015},
volume={},
number={},
pages={283-288},
doi={10.1109/SmartGridComm.2015.7436314}
}
@article{plc_firmware,
title = {Firmware modification attacks on programmable logic controllers},
journal = {International Journal of Critical Infrastructure Protection},
volume = {6},
number = {2},
pages = {76-84},
year = {2013},
issn = {1874-5482},
doi = {https://doi.org/10.1016/j.ijcip.2013.04.004},
url = {https://www.sciencedirect.com/science/article/pii/S1874548213000231},
author = {Zachry Basnight and Jonathan Butts and Juan Lopez and Thomas Dube},
keywords = {Industrial control systems, Programmable logic controllers, Firmware, Modification attacks, Reverse engineering},
}
@article{santamarta2012here,
title={Here be backdoors: A journey into the secrets of industrial firmware},
author={Santamarta, Ruben},
journal={Black Hat USA},
year={2012}
}
@ARTICLE{health_review, author={Yaqoob, Tahreem and Abbas, Haider and Atiquzzaman, Mohammed}, journal={IEEE Communications Surveys Tutorials}, title={Security Vulnerabilities, Attacks, Countermeasures, and Regulations of Networked Medical Devices—A Review}, year={2019}, volume={21}, number={4}, pages={3723-3768}, doi={10.1109/COMST.2019.2914094}}
@article{pacemaker,
author = {Adrian Baranchuk and Bryce Alexander and Debra Campbell and Sohaib Haseeb and Damian Redfearn and Chris Simpson and Ben Glover },
title = {Pacemaker Cybersecurity},
journal = {Circulation},
volume = {138},
number = {12},
pages = {1272-1273},
year = {2018},
doi = {10.1161/CIRCULATIONAHA.118.035261},
URL = {https://www.ahajournals.org/doi/abs/10.1161/CIRCULATIONAHA.118.035261},
eprint = {https://www.ahajournals.org/doi/pdf/10.1161/CIRCULATIONAHA.118.035261}
}
@article{medical_case_study,
author = {Ang Cui, Michael Costello and Salvatore J. Stolfo},
title = {When Firmware Modifications Attack: A Case Study of Embedded Exploitation},
journal = {20th Annual Network & Distributed System Security Symposium 2013},
year = {2013},
}
@InProceedings{railway,
author={B{\"a}ckman, Ronny and Oliver, Ian and Limonta, Gabriela},
editor="Casimiro, Ant{\'o}nio
and Ortmeier, Frank
and Schoitsch, Erwin
and Bitsch, Friedemann
and Ferreira, Pedro",
title="Integrity Checking of Railway Interlocking Firmware",
booktitle="Computer Safety, Reliability, and Security. SAFECOMP 2020 Workshops",year="2020",
publisher="Springer International Publishing",
address="Cham",
pages="161--175",}
@INPROCEEDINGS{cars, author={Nilsson, Dennis K. and Phung, Phu H. and Larson, Ulf E.}, booktitle={IET Road Transport Information and Control - RTIC 2008 and ITS United Kingdom Members' Conference}, title={Vehicle ECU classification based on safety-security characteristics}, year={2008}, volume={}, number={}, pages={1-7}, doi={10.1049/ic.2008.0810}}
@article{BASNIGHT201377,
title = {Firmware modification attacks on programmable logic controllers},
journal = {International Journal of Critical Infrastructure Protection},
volume = {6},
number = {2},
pages = {76-84},
year = {2013},
issn = {1874-5482},
doi = {https://doi.org/10.1016/j.ijcip.2013.04.004},
url = {https://www.sciencedirect.com/science/article/pii/S1874548213000231},
author = {Zachry Basnight and Jonathan Butts and Juan Lopez and Thomas Dube},
keywords = {Industrial control systems, Programmable logic controllers, Firmware, Modification attacks, Reverse engineering}
}
@INPROCEEDINGS{9065145, author={Gao, Chao and Luo, Lan and Zhang, Yue and Pearson, Bryan and Fu, Xinwen}, booktitle={2019 IEEE International Conference on Industrial Internet (ICII)}, title={Microcontroller Based IoT System Firmware Security: Case Studies}, year={2019}, volume={}, number={}, pages={200-209}, doi={10.1109/ICII.2019.00045}}
@article{thrangrycats,
title={Thrangrycat flaw lets attackers plant persistent backdoors on Cisco gear},
author={Cimpanu, C},
journal={Accessed: Sep},
volume={15},
pages={2019},
year={2019}
}
@article{hidden,
title={Source Hidden for Double Blind Review},
author={Jhon Doe},
journal = {Journal},
year = {2022},
}
@INPROCEEDINGS{blockchain1,
author={Dhakal, Samip and Jaafar, Fehmi and Zavarsky, Pavol},
booktitle={2019 IEEE 19th International Symposium on High Assurance Systems Engineering (HASE)},
title={Private Blockchain Network for IoT Device Firmware Integrity Verification and Update},
year={2019},
volume={},
number={},
pages={164-170},
doi={10.1109/HASE.2019.00033}
}
@inproceedings{sca_attack,
author = {Liu, Yannan and Wei, Lingxiao and Zhou, Zhe and Zhang, Kehuan and Xu, Wenyuan and Xu, Qiang},
title = {On Code Execution Tracking via Power Side-Channel},
year = {2016},
isbn = {9781450341394},
publisher = {Association for Computing Machinery},
address = {New York, NY, USA},
url = {https://doi.org/10.1145/2976749.2978299},
doi = {10.1145/2976749.2978299},
booktitle = {Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security},
pages = {10191031},
numpages = {13},
keywords = {code execution tracking, power side-channel, embedded system, hardware security},
location = {Vienna, Austria},
series = {CCS '16}
}
@INPROCEEDINGS{7928948, author={Krishnankutty, Deepak and Robucci, Ryan and Banerjee, Nilanjan and Patel, Chintan}, booktitle={2017 IEEE 35th VLSI Test Symposium (VTS)}, title={Fiscal: Firmware identification using side-channel power analysis}, year={2017}, volume={}, number={}, pages={1-6}, doi={10.1109/VTS.2017.7928948}}
@inproceedings{ssd_firmware,
author = {Brown, Dane and Walker, Owens and Rakvic, Ryan and Ives, Robert W. and Ngo, Hau and Shey, James and Blanco, Justin},
title = {Towards Detection of Modified Firmware on Solid State Drives via Side Channel Analysis},
year = {2018},
isbn = {9781450364751},
publisher = {Association for Computing Machinery},
address = {New York, NY, USA},
url = {https://doi.org/10.1145/3240302.3285860},
doi = {10.1145/3240302.3285860},
booktitle = {Proceedings of the International Symposium on Memory Systems},
pages = {315320},
numpages = {6},
keywords = {firmware, security, classification, embedded systems},
location = {Alexandria, Virginia, USA},
series = {MEMSYS '18}
}
@article{timing,
title = {Using timing-based side channels for anomaly detection in industrial control systems},
journal = {International Journal of Critical Infrastructure Protection},
volume = {15},
pages = {12-26},
year = {2016},
issn = {1874-5482},
doi = {https://doi.org/10.1016/j.ijcip.2016.07.003},
url = {https://www.sciencedirect.com/science/article/pii/S1874548216301111},
author = {Stephen Dunlap and Jonathan Butts and Juan Lopez and Mason Rice and Barry Mullins},
}
@INPROCEEDINGS{DTU, author={Xu, Aidong and Jiang, Yixin and Cao, Yang and Zhang, Guoming and Ji, Xiaoyu and Xu, Wenyuan}, booktitle={2019 IEEE 3rd Conference on Energy Internet and Energy System Integration (EI2)}, title={ADDP: Anomaly Detection for DTU Based on Power Consumption Side-Channel}, year={2019}, volume={}, number={}, pages={2659-2663}, doi={10.1109/EI247390.2019.9062014}}
@inproceedings {wud,
author = {Shane S. Clark and Benjamin Ransford and Amir Rahmati and Shane Guineau and Jacob Sorber and Wenyuan Xu and Kevin Fu},
title = {{WattsUpDoc}: Power Side Channels to Nonintrusively Discover Untargeted Malware on Embedded Medical Devices},
booktitle = {2013 USENIX Workshop on Health Information Technologies (HealthTech 13)},
year = {2013},
address = {Washington, D.C.},
url = {https://www.usenix.org/conference/healthtech13/workshop-program/presentation/clark},
publisher = {USENIX Association},
month = aug,
}
@dataset{dataset,
author = {Anonymous},
title = {Dataset of bootup power consumption traces for four networking equipments.},
month = apr,
year = 2022,
publisher = {Zenodo},
doi = {10.5281/zenodo.6419214},
url = {https://doi.org/10.5281/zenodo.6419214}
}
@book{han2011data,
title={Data mining: concepts and techniques},
author={Han, Jiawei and Pei, Jian and Kamber, Micheline},
year={2011},
publisher={Elsevier}
}
@article{zimmering2021generating,
title={Generating Artificial Sensor Data for the Comparison of Unsupervised Machine Learning Methods},
author={Zimmering, Bernd and Niggemann, Oliver and Hasterok, Constanze and Pfannstiel, Erik and Ramming, Dario and Pfrommer, Julius},
journal={Sensors},
volume={21},
number={7},
pages={2397},
year={2021},
publisher={Multidisciplinary Digital Publishing Institute}
}
@INPROCEEDINGS{8326960,
author={Dey, Vishal and Pudi, Vikramkumar and Chattopadhyay, Anupam and Elovici, Yuval},
booktitle={2018 31st International Conference on VLSI Design and 2018 17th International Conference on Embedded Systems (VLSID)},
title={Security Vulnerabilities of Unmanned Aerial Vehicles and Countermeasures: An Experimental Study},
year={2018},
volume={},
number={},
pages={398-403},
doi={10.1109/VLSID.2018.97}
}
@INPROCEEDINGS{8433205,
author={Chen, Wenxin and Dong, Yingfei and Duan, Zhenhai},
booktitle={2018 IEEE Conference on Communications and Network Security (CNS)},
title={Manipulating Drone Dynamic State Estimation to Compromise Navigation},
year={2018},
volume={},
number={},
pages={1-9},
doi={10.1109/CNS.2018.8433205}
}
@ARTICLE{8556480,
author={Bisio, Igor and Garibotto, Chiara and Lavagetto, Fabio and Sciarrone, Andrea and Zappatore, Sandro},
journal={IEEE Transactions on Vehicular Technology},
title={Blind Detection: Advanced Techniques for WiFi-Based Drone Surveillance},
year={2019},
volume={68},
number={1},
pages={938-946},
doi={10.1109/TVT.2018.2884767}
}