1764 lines
60 KiB
BibTeX
1764 lines
60 KiB
BibTeX
@INPROCEEDINGS{7163050,
|
||
author={F. {Liu} and Y. {Yarom} and Q. {Ge} and G. {Heiser} and R. B. {Lee}},
|
||
booktitle={2015 IEEE Symposium on Security and Privacy},
|
||
title={Last-Level Cache Side-Channel Attacks are Practical},
|
||
year={2015},
|
||
volume={},
|
||
number={},
|
||
pages={605-622},
|
||
keywords={cache storage;cloud computing;security of data;virtual machines;last-level cache side-channel attacks;Prime+Probe side-channel attack;covert channel;cross-core attack;cross-VM attack;GnuPG;virtual machine monitor;IaaS cloud computing;Probes;Indexes;Multicore processing;Monitoring;Cryptography;Virtual machine monitors;Memory management;side-channel attack;cross-VM side channel;covert channel;last-level cache;ElGamal},
|
||
doi={10.1109/SP.2015.43},
|
||
ISSN={2375-1207},
|
||
month={May},}
|
||
|
||
@inproceedings{10.1145/2976749.2978299,
|
||
author = {Liu, Yannan and Wei, Lingxiao and Zhou, Zhe and Zhang, Kehuan and Xu, Wenyuan and Xu, Qiang},
|
||
title = {On Code Execution Tracking via Power Side-Channel},
|
||
year = {2016},
|
||
isbn = {9781450341394},
|
||
publisher = {Association for Computing Machinery},
|
||
address = {New York, NY, USA},
|
||
url = {https://doi.org/10.1145/2976749.2978299},
|
||
doi = {10.1145/2976749.2978299},
|
||
booktitle = {Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security},
|
||
pages = {1019–1031},
|
||
numpages = {13},
|
||
keywords = {embedded system, hardware security, power side-channel, code execution tracking},
|
||
location = {Vienna, Austria},
|
||
series = {CCS ’16}
|
||
}
|
||
|
||
@Article{Moreno2018,
|
||
author="Moreno, Carlos and Fischmeister, Sebastian",
|
||
title="Non-intrusive runtime monitoring through power consumption to enforce safety and security properties in embedded systems",
|
||
journal="Formal Methods in System Design",
|
||
year="2018",
|
||
month="Aug",
|
||
day="01",
|
||
volume="53",
|
||
number="1",
|
||
pages="113--137",
|
||
issn="1572-8102",
|
||
doi="10.1007/s10703-017-0298-3",
|
||
url="https://doi.org/10.1007/s10703-017-0298-3"
|
||
}
|
||
|
||
@inproceedings {cisco_trust,
|
||
author = {Jatin Kataria and Rick Housley and Joseph Pantoga and Ang Cui},
|
||
title = {Defeating Cisco Trust Anchor: A Case-Study of Recent Advancements in Direct {FPGA} Bitstream Manipulation},
|
||
booktitle = {13th {USENIX} Workshop on Offensive Technologies ({WOOT} 19)},
|
||
year = {2019},
|
||
address = {Santa Clara, CA},
|
||
url = {https://www.usenix.org/conference/woot19/presentation/kataria},
|
||
publisher = {{USENIX} Association},
|
||
month = aug
|
||
}
|
||
|
||
@inproceedings{Cui2013WhenFM,
|
||
title={When Firmware Modifications Attack: A Case Study of Embedded Exploitation},
|
||
author={Ang Cui and Michael Costello and Salvatore J. Stolfo},
|
||
booktitle={NDSS},
|
||
url={http://ids.cs.columbia.edu/sites/default/files/ndss-2013.pdf},
|
||
year={2013}
|
||
}
|
||
|
||
@misc{thomson_2019,
|
||
title={It's 2019 so now security vulnerabilities are branded using emojis: Meet Thrangrycat, a Cisco router secure boot flaw},
|
||
url={https://www.theregister.co.uk/2019/05/13/cisco_thrangrycat_vulnerability/},
|
||
journal={The Register},
|
||
publisher={The Register},
|
||
author={Thomson, Iain},
|
||
year={2019},
|
||
month={May}
|
||
}
|
||
|
||
@misc{hau_2015,
|
||
title="{SYNful Knock -- A Cisco router implant -- Part I}",
|
||
url = {https://www.fireeye.com/blog/threat-research/2015/09/synful_knock_-_acis.html},
|
||
publisher={FireEye},
|
||
author={Hau, Bill},
|
||
year={2015},
|
||
month={Sep}
|
||
}
|
||
|
||
@InProceedings{10.1007/3-540-36400-5_4,
|
||
author="Agrawal, Dakshi
|
||
and Archambeault, Bruce
|
||
and Rao, Josyula R.
|
||
and Rohatgi, Pankaj",
|
||
editor="Kaliski, Burton S.
|
||
and Ko{\c{c}}, {\c{c}}etin K.
|
||
and Paar, Christof",
|
||
title="The EM Side---Channel(s)",
|
||
booktitle="Cryptographic Hardware and Embedded Systems - CHES 2002",
|
||
year="2003",
|
||
publisher="Springer Berlin Heidelberg",
|
||
address="Berlin, Heidelberg",
|
||
pages="29--45",
|
||
}
|
||
|
||
@article{printers,
|
||
title = {Acoustic Side-Channel Attacks on Printers},
|
||
author = {Michael Backes, Markus Dürmuth, Sebastian Gerling, Manfred Pinkal, Caroline Sporleder},
|
||
year = {2010},
|
||
publisher = {https://www.usenix.org/legacy/event/sec10/tech/full_papers/Backes.pdf},
|
||
}
|
||
|
||
@article{10.1145/1609956.1609959,
|
||
author = {Zhuang, Li and Zhou, Feng and Tygar, J. D.},
|
||
title = {Keyboard Acoustic Emanations Revisited},
|
||
year = {2009},
|
||
issue_date = {October 2009},
|
||
publisher = {Association for Computing Machinery},
|
||
address = {New York, NY, USA},
|
||
volume = {13},
|
||
number = {1},
|
||
issn = {1094-9224},
|
||
url = {https://doi.org/10.1145/1609956.1609959},
|
||
doi = {10.1145/1609956.1609959},
|
||
journal = {ACM Trans. Inf. Syst. Secur.},
|
||
month = nov,
|
||
articleno = {Article 3},
|
||
numpages = {26},
|
||
keywords = {privacy, cepstrum, learning theory, signal analysis, acoustic manations, Computer security, HMM, human factors, keyboards, hidden markov models, electronic eavesdropping}
|
||
}
|
||
|
||
@InProceedings{10.1007/3-540-68697-5_9,
|
||
author="Kocher, Paul C.",
|
||
editor="Koblitz, Neal",
|
||
title="Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems",
|
||
booktitle="Advances in Cryptology --- CRYPTO '96",
|
||
year="1996",
|
||
publisher="Springer Berlin Heidelberg",
|
||
address="Berlin, Heidelberg",
|
||
pages="104--113",
|
||
}
|
||
|
||
|
||
@article{osti_1372902,
|
||
title = {{United States} Data Center Energy Usage Report},
|
||
author = {Shehabi, Arman and Smith, Sarah and Sartor, Dale and Brown, Richard and Herrlin, Magnus and Koomey, Jonathan and Masanet, Eric and Horner, Nathaniel and Azevedo, Inês and Lintner, William},
|
||
doi = {10.2172/1372902},
|
||
place = {United States},
|
||
year = {2016},
|
||
month = {6}
|
||
}
|
||
|
||
@ARTICLE{6848725,
|
||
author={K. {Bilal} and S. U. R. {Malik} and S. U. {Khan} and A. Y. {Zomaya}},
|
||
journal={IEEE Cloud Computing},
|
||
title={Trends and challenges in cloud datacenters},
|
||
year={2014},
|
||
volume={1},
|
||
number={1},
|
||
pages={10-20},
|
||
keywords={cloud computing;computer centres;quality of service;virtualisation;reliability;cloud DCs;quality of service;cloud computing paradigm;virtualization technology;next-generation data centers;cloud data centers;Computer architecture;Cloud computing;Data centers;Bandwidth allocation;Next generation networking;Virtualization;Resource allocation;cloud;cloud computing;cloud data center;thermal awareness;resource utilization;resources consolidation techniques;virtualization},
|
||
doi={10.1109/MCC.2014.26},
|
||
ISSN={2372-2568},
|
||
month={May},}
|
||
|
||
@article{VINCENT201577,
|
||
title = "Trojan Detection and Side-channel Analyses for Cyber-security in Cyber-physical Manufacturing Systems",
|
||
journal = "Procedia Manufacturing",
|
||
volume = "1",
|
||
pages = "77 - 85",
|
||
year = "2015",
|
||
note = "43rd North American Manufacturing Research Conference, NAMRC 43, 8-12 June 2015, UNC Charlotte, North Carolina, United States",
|
||
issn = "2351-9789",
|
||
doi = "https://doi.org/10.1016/j.promfg.2015.09.065",
|
||
url = "http://www.sciencedirect.com/science/article/pii/S2351978915010653",
|
||
author = "Hannah Vincent and Lee Wells and Pablo Tarazaga and Jaime Camelio",
|
||
keywords = "Cyber-Attack detection, Cyber-Physical manufacturing systems, Quality control, Side-Channel analyses, Structural Health Monitoring, Trojans",
|
||
}
|
||
|
||
@inproceedings{quisquater2001electromagnetic,
|
||
title={Electromagnetic analysis (ema): Measures and counter-measures for smart cards},
|
||
author={Quisquater, Jean-Jacques and Samyde, David},
|
||
booktitle={International Conference on Research in Smart Cards},
|
||
pages={200--210},
|
||
year={2001},
|
||
organization={Springer}
|
||
}
|
||
|
||
@inproceedings{fuller2018exploiting,
|
||
title={Exploiting side-channel emissions to detect changes in FPGA firmware},
|
||
author={Fuller, Ryan M and Riley, Ronald A and Graham, James T},
|
||
booktitle={Cyber Sensing 2018},
|
||
volume={10630},
|
||
pages={106300A},
|
||
year={2018},
|
||
organization={International Society for Optics and Photonics}
|
||
}
|
||
|
||
@ARTICLE{1456237, author={R. E. {Crochiere} and L. R. {Rabiner}}, journal={Proceedings of the IEEE}, title={Interpolation and decimation of digital signals—A tutorial review}, year={1981}, volume={69}, number={3}, pages={300-331},}
|
||
@article{hospodar2011machine,
|
||
title={Machine learning in side-channel analysis: a first study},
|
||
author={Hospodar, Gabriel and Gierlichs, Benedikt and De Mulder, Elke and Verbauwhede, Ingrid and Vandewalle, Joos},
|
||
journal={Journal of Cryptographic Engineering},
|
||
volume={1},
|
||
number={4},
|
||
pages={293},
|
||
year={2011},
|
||
publisher={Springer}
|
||
}
|
||
|
||
@inproceedings{moreno2016non,
|
||
title={Non-intrusive runtime monitoring through power consumption: a signals and system analysis approach to reconstruct the trace},
|
||
author={Moreno, Carlos and Fischmeister, Sebastian},
|
||
booktitle={International Conference on Runtime Verification},
|
||
pages={268--284},
|
||
year={2016},
|
||
organization={Springer}
|
||
}
|
||
|
||
@book{mangard2008power,
|
||
title={Power analysis attacks: Revealing the secrets of smart cards},
|
||
author={Mangard, Stefan and Oswald, Elisabeth and Popp, Thomas},
|
||
volume={31},
|
||
year={2008},
|
||
publisher={Springer Science \& Business Media}
|
||
}
|
||
|
||
@inproceedings{kocher1996timing,
|
||
title={Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems},
|
||
author={Kocher, Paul C},
|
||
booktitle={Annual International Cryptology Conference},
|
||
pages={104--113},
|
||
year={1996},
|
||
organization={Springer}
|
||
}
|
||
|
||
@article{goldack2008side,
|
||
title={Side-channel based reverse engineering for microcontrollers},
|
||
author={Goldack, Martin and Paar, Ing Christof},
|
||
journal={Master's thesis, Ruhr-Universit{\"a}t Bochum, Germany},
|
||
year={2008}
|
||
}
|
||
|
||
@article{khan2019malware,
|
||
title={Malware Detection in Embedded Systems Using Neural Network Model for Electromagnetic Side-Channel Signals},
|
||
author={Khan, Haider Adnan and Sehatbakhsh, Nader and Nguyen, Luong N and Prvulovic, Milos and Zaji{\'c}, Alenka},
|
||
journal={Journal of Hardware and Systems Security},
|
||
volume={3},
|
||
number={4},
|
||
pages={305--318},
|
||
year={2019},
|
||
publisher={Springer}
|
||
}
|
||
|
||
@incollection{eisenbarth2010building,
|
||
title={Building a side channel based disassembler},
|
||
author={Eisenbarth, Thomas and Paar, Christof and Weghenkel, Bj{\"o}rn},
|
||
booktitle={Transactions on Computational Science X},
|
||
pages={78--99},
|
||
year={2010},
|
||
publisher={Springer}
|
||
}
|
||
|
||
@inproceedings{kocher1999differential,
|
||
title={Differential power analysis},
|
||
author={Kocher, Paul and Jaffe, Joshua and Jun, Benjamin},
|
||
booktitle={Annual International Cryptology Conference},
|
||
pages={388--397},
|
||
year={1999},
|
||
organization={Springer}
|
||
}
|
||
|
||
@inproceedings{picek2017climbing,
|
||
title={Climbing down the hierarchy: hierarchical classification for machine learning side-channel attacks},
|
||
author={Picek, Stjepan and Heuser, Annelie and Jovic, Alan and Legay, Axel},
|
||
booktitle={International Conference on Cryptology in Africa},
|
||
pages={61--78},
|
||
year={2017},
|
||
organization={Springer}
|
||
}
|
||
|
||
@inproceedings{picek2018performance,
|
||
title={On the performance of convolutional neural networks for side-channel analysis},
|
||
author={Picek, Stjepan and Samiotis, Ioannis Petros and Kim, Jaehun and Heuser, Annelie and Bhasin, Shivam and Legay, Axel},
|
||
booktitle={International Conference on Security, Privacy, and Applied Cryptography Engineering},
|
||
pages={157--176},
|
||
year={2018},
|
||
organization={Springer}
|
||
}
|
||
|
||
@article{picek2019theory,
|
||
title={When theory meets practice: A framework for robust profiled side-channel analysis},
|
||
author={Picek, Stjepan and Heuser, Annelie and Alippi, Cesare and Regazzoni, Francesco},
|
||
year={2019}
|
||
}
|
||
|
||
@inproceedings{brier2004correlation,
|
||
title={Correlation power analysis with a leakage model},
|
||
author={Brier, Eric and Clavier, Christophe and Olivier, Francis},
|
||
booktitle={International Workshop on Cryptographic Hardware and Embedded Systems},
|
||
pages={16--29},
|
||
year={2004},
|
||
organization={Springer}
|
||
}
|
||
|
||
|
||
|
||
@inproceedings{shumov2010side,
|
||
title={Side channel leakage profiling in software},
|
||
author={Shumov, D and Montgomery, Peter L},
|
||
booktitle={COSADE 2010},
|
||
year={2010},
|
||
organization={Citeseer}
|
||
}
|
||
|
||
@inproceedings{blanco2017framework,
|
||
title={A framework for acquiring and analyzing traces from cryptographic devices},
|
||
author={Blanco, Alfonso Blanco and de Fuentes, Jose Mar{\'\i}a and Gonz{\'a}lez-Manzano, Lorena and Encinas, Luis Hern{\'a}ndez and Mu{\~n}oz, Agust{\'\i}n Mart{\'\i}n and Oliva, Jos{\'e} Luis Rodrigo and Garc{\'\i}a, J Ignacio S{\'a}nchez},
|
||
booktitle={International Conference on Security and Privacy in Communication Systems},
|
||
pages={283--300},
|
||
year={2017},
|
||
organization={Springer}
|
||
}
|
||
|
||
@misc{NationalInstrumentsHIL,
|
||
author = {National Instruments},
|
||
title = {{Hardware In The Loop Test System}},
|
||
howpublished = "\url{https://www.ni.com/en-ca/innovations/white-papers/09/hardware-in-the-loop--hil--test-system-architectures.html#section--650933511}"
|
||
}
|
||
|
||
@misc{DSpace,
|
||
author = {DSpace},
|
||
title = {{Hardware In The Loop Test System}},
|
||
howpublished = "\url{https://www.dspace.com/shared/data/pdf/2019/dSPACE-Hardware-in-the-Loop-Systems_Business-field-brochure_01-2019_English.pdf}"
|
||
}
|
||
|
||
@misc{Labview,
|
||
author = {National Instruments},
|
||
title = {{LabVIEW DAQ}},
|
||
howpublished = "\url{https://www.ni.com/academic/students/learn-daq/}"
|
||
}
|
||
|
||
% Impact of human error:
|
||
|
||
@article{BARCHARD20131917,
|
||
title = "Improving data accuracy: Selecting the best data checking technique",
|
||
journal = "Computers in Human Behavior",
|
||
volume = "29",
|
||
number = "5",
|
||
pages = "1917 - 1922",
|
||
year = "2013",
|
||
issn = "0747-5632",
|
||
doi = "https://doi.org/10.1016/j.chb.2013.02.021",
|
||
url = "http://www.sciencedirect.com/science/article/pii/S0747563213000873",
|
||
author = "Kimberly A. Barchard and Yevgeniya Verenikina",
|
||
keywords = "Data checking, Double entry, Read aloud, Visual checking",
|
||
}
|
||
|
||
@article{BARCHARD20111834,
|
||
title = "Preventing human error: The impact of data entry methods on data accuracy and statistical results",
|
||
journal = "Computers in Human Behavior",
|
||
volume = "27",
|
||
number = "5",
|
||
pages = "1834 - 1839",
|
||
year = "2011",
|
||
note = "2009 Fifth International Conference on Intelligent Computing",
|
||
issn = "0747-5632",
|
||
doi = "https://doi.org/10.1016/j.chb.2011.04.004",
|
||
url = "http://www.sciencedirect.com/science/article/pii/S0747563211000707",
|
||
author = "Kimberly A. Barchard and Larry A. Pace",
|
||
keywords = "Data entry, Double entry, Visual checking, Outliers, Data cleaning",
|
||
}
|
||
|
||
@article{kozak2015,
|
||
author = {Marcin Kozak and Wojtek Krzanowski and Izabela Cichocka and James Hartley},
|
||
title = {The effects of data input errors on subsequent statistical inference},
|
||
journal = {Journal of Applied Statistics},
|
||
volume = {42},
|
||
number = {9},
|
||
pages = {2030-2037},
|
||
year = {2015},
|
||
publisher = {Taylor & Francis},
|
||
doi = {10.1080/02664763.2015.1016410},
|
||
URL = {https://doi.org/10.1080/02664763.2015.1016410},
|
||
eprint = {https://doi.org/10.1080/02664763.2015.1016410}
|
||
}
|
||
|
||
@article{tu2015,
|
||
author = {Tu, Huawei and Oladimeji, Patrick and Wiseman, Sarah and Thimbleby, Harold and Cairns, Paul and Niezen, Gerrit},
|
||
title = "{Employing Number-Based Graphical Representations to Enhance the Effects of Visual Check on Entry Error Detection}",
|
||
journal = {Interacting with Computers},
|
||
volume = {28},
|
||
number = {2},
|
||
pages = {194-207},
|
||
year = {2015},
|
||
month = {07},
|
||
issn = {0953-5438},
|
||
doi = {10.1093/iwc/iwv020},
|
||
url = {https://doi.org/10.1093/iwc/iwv020},
|
||
eprint = {https://academic.oup.com/iwc/article-pdf/28/2/194/6956430/iwv020.pdf},
|
||
}
|
||
|
||
@article{patel2011impact,
|
||
title={Impact of outlier removal and normalization approach in modified k-means clustering algorithm},
|
||
author={Patel, Vaishali R and Mehta, Rupa G},
|
||
journal={International Journal of Computer Science Issues (IJCSI)},
|
||
volume={8},
|
||
number={5},
|
||
pages={331},
|
||
year={2011},
|
||
publisher={Citeseer}
|
||
}
|
||
|
||
|
||
|
||
@inproceedings{koch2010security,
|
||
title={{Security system for encrypted environments (S2E2)}},
|
||
author={Koch, Robert and Rodosek, Gabi Dreo},
|
||
booktitle={International Workshop on Recent Advances in Intrusion Detection},
|
||
pages={505--507},
|
||
year={2010},
|
||
organization={Springer}
|
||
}
|
||
|
||
@inproceedings{moreno2016non,
|
||
title={Non-intrusive runtime monitoring through power consumption: a signals and system analysis approach to reconstruct the trace},
|
||
author={Moreno, Carlos and Fischmeister, Sebastian},
|
||
booktitle={International Conference on Runtime Verification},
|
||
pages={268--284},
|
||
year={2016},
|
||
organization={Springer}
|
||
}
|
||
|
||
|
||
|
||
|
||
|
||
@article{VINCENT201577,
|
||
title = "Trojan Detection and Side-channel Analyses for Cyber-security in Cyber-physical Manufacturing Systems",
|
||
journal = "Procedia Manufacturing",
|
||
volume = "1",
|
||
pages = "77 - 85",
|
||
year = "2015",
|
||
note = "43rd North American Manufacturing Research Conference, NAMRC 43, 8-12 June 2015, UNC Charlotte, North Carolina, United States",
|
||
issn = "2351-9789",
|
||
doi = "https://doi.org/10.1016/j.promfg.2015.09.065",
|
||
url = "http://www.sciencedirect.com/science/article/pii/S2351978915010653",
|
||
author = "Hannah Vincent and Lee Wells and Pablo Tarazaga and Jaime Camelio",
|
||
keywords = "Cyber-Attack detection, Cyber-Physical manufacturing systems, Quality control, Side-Channel analyses, Structural Health Monitoring, Trojans",
|
||
}
|
||
|
||
|
||
|
||
@inproceedings{fuller2018exploiting,
|
||
title={Exploiting side-channel emissions to detect changes in FPGA firmware},
|
||
author={Fuller, Ryan M and Riley, Ronald A and Graham, James T},
|
||
booktitle={Cyber Sensing 2018},
|
||
volume={10630},
|
||
pages={106300A},
|
||
year={2018},
|
||
organization={International Society for Optics and Photonics}
|
||
}
|
||
|
||
@article{hospodar2011machine,
|
||
title={Machine learning in side-channel analysis: a first study},
|
||
author={Hospodar, Gabriel and Gierlichs, Benedikt and De Mulder, Elke and Verbauwhede, Ingrid and Vandewalle, Joos},
|
||
journal={Journal of Cryptographic Engineering},
|
||
volume={1},
|
||
number={4},
|
||
pages={293},
|
||
year={2011},
|
||
publisher={Springer}
|
||
}
|
||
|
||
@inproceedings{moreno2016non,
|
||
title={Non-intrusive runtime monitoring through power consumption: a signals and system analysis approach to reconstruct the trace},
|
||
author={Moreno, Carlos and Fischmeister, Sebastian},
|
||
booktitle={International Conference on Runtime Verification},
|
||
pages={268--284},
|
||
year={2016},
|
||
organization={Springer}
|
||
}
|
||
|
||
|
||
|
||
|
||
@inproceedings{picek2017climbing,
|
||
title={Climbing down the hierarchy: hierarchical classification for machine learning side-channel attacks},
|
||
author={Picek, Stjepan and Heuser, Annelie and Jovic, Alan and Legay, Axel},
|
||
booktitle={International Conference on Cryptology in Africa},
|
||
pages={61--78},
|
||
year={2017},
|
||
organization={Springer}
|
||
}
|
||
|
||
@inproceedings{picek2018performance,
|
||
title={On the performance of convolutional neural networks for side-channel analysis},
|
||
author={Picek, Stjepan and Samiotis, Ioannis Petros and Kim, Jaehun and Heuser, Annelie and Bhasin, Shivam and Legay, Axel},
|
||
booktitle={International Conference on Security, Privacy, and Applied Cryptography Engineering},
|
||
pages={157--176},
|
||
year={2018},
|
||
organization={Springer}
|
||
}
|
||
|
||
@article{picek2019theory,
|
||
title={When theory meets practice: A framework for robust profiled side-channel analysis},
|
||
author={Picek, Stjepan and Heuser, Annelie and Alippi, Cesare and Regazzoni, Francesco},
|
||
year={2019}
|
||
}
|
||
|
||
|
||
|
||
@inproceedings{shumov2010side,
|
||
title={Side channel leakage profiling in software},
|
||
author={Shumov, D and Montgomery, Peter L},
|
||
booktitle={COSADE 2010},
|
||
year={2010},
|
||
organization={Citeseer}
|
||
}
|
||
|
||
@inproceedings{blanco2017framework,
|
||
title={A framework for acquiring and analyzing traces from cryptographic devices},
|
||
author={Blanco, Alfonso Blanco and de Fuentes, Jose Mar{\'\i}a and Gonz{\'a}lez-Manzano, Lorena and Encinas, Luis Hern{\'a}ndez and Mu{\~n}oz, Agust{\'\i}n Mart{\'\i}n and Oliva, Jos{\'e} Luis Rodrigo and Garc{\'\i}a, J Ignacio S{\'a}nchez},
|
||
booktitle={International Conference on Security and Privacy in Communication Systems},
|
||
pages={283--300},
|
||
year={2017},
|
||
organization={Springer}
|
||
}
|
||
|
||
@misc{NationalInstrumentsHIL,
|
||
author = {National Instruments},
|
||
title = {{Hardware In The Loop Test System}},
|
||
howpublished = "\url{https://www.ni.com/en-ca/innovations/white-papers/09/hardware-in-the-loop--hil--test-system-architectures.html#section--650933511}"
|
||
}
|
||
|
||
@misc{DSpace,
|
||
author = {DSpace},
|
||
title = {{Hardware In The Loop Test System}},
|
||
howpublished = "\url{https://www.dspace.com/shared/data/pdf/2019/dSPACE-Hardware-in-the-Loop-Systems_Business-field-brochure_01-2019_English.pdf}"
|
||
}
|
||
|
||
@misc{Labview,
|
||
author = {National Instruments},
|
||
title = {{LabVIEW DAQ}},
|
||
howpublished = "\url{https://www.ni.com/academic/students/learn-daq/}"
|
||
}
|
||
|
||
% Impact of human error:
|
||
|
||
|
||
|
||
|
||
|
||
@article{patel2011impact,
|
||
title={Impact of outlier removal and normalization approach in modified k-means clustering algorithm},
|
||
author={Patel, Vaishali R and Mehta, Rupa G},
|
||
journal={International Journal of Computer Science Issues (IJCSI)},
|
||
volume={8},
|
||
number={5},
|
||
pages={331},
|
||
year={2011},
|
||
publisher={Citeseer}
|
||
}
|
||
|
||
|
||
|
||
@misc{cve-2018-15439,
|
||
key = {CVE-2018-15439},
|
||
title = {{CVE-2018-15439}},
|
||
howpublished = {National Vulnerability Database},
|
||
institution = {NIST},
|
||
day = 08,
|
||
month = {November},
|
||
year = 2018,
|
||
note = {\url{https://nvd.nist.gov/vuln/detail/CVE-2018-15439}},
|
||
url = {https://nvd.nist.gov/vuln/detail/CVE-2018-15439}
|
||
}
|
||
|
||
@misc{cve-2018-0329,
|
||
key = {CVE-2018-0329},
|
||
title = {{CVE-2018-0329}},
|
||
howpublished = {National Vulnerability Database},
|
||
institution = {NIST},
|
||
day = 08,
|
||
month = {November},
|
||
year = 2018,
|
||
note = {\url{https://nvd.nist.gov/vuln/detail/CVE-2018-0329}},
|
||
url = {https://nvd.nist.gov/vuln/detail/CVE-2018-0329}
|
||
}
|
||
|
||
@misc{cve-2018-0222,
|
||
key = {CVE-2018-0222},
|
||
title = {{CVE-2018-0222}},
|
||
howpublished = {National Vulnerability Database},
|
||
institution = {NIST},
|
||
day = 16,
|
||
month = {May},
|
||
year = 2018,
|
||
note = {\url{https://nvd.nist.gov/vuln/detail/CVE-2018-0222}},
|
||
url = {https://nvd.nist.gov/vuln/detail/CVE-2018-0222}
|
||
}
|
||
|
||
@misc{cve-2018-0151,
|
||
key = {CVE-2018-0151},
|
||
title = {{CVE-2018-0151}},
|
||
howpublished = {National Vulnerability Database},
|
||
institution = {NIST},
|
||
day = 28,
|
||
month = {March},
|
||
year = 2018,
|
||
note = {\url{https://nvd.nist.gov/vuln/detail/CVE-2018-0151}},
|
||
url = {https://nvd.nist.gov/vuln/detail/CVE-2018-0151}
|
||
}
|
||
|
||
@misc{cve-2018-0150,
|
||
key = {CVE-2018-0150},
|
||
title = {{CVE-2018-0150}},
|
||
howpublished = {National Vulnerability Database},
|
||
institution = {NIST},
|
||
day = 28,
|
||
month = {March},
|
||
year = 2018,
|
||
note = {\url{https://nvd.nist.gov/vuln/detail/CVE-2018-0150}},
|
||
url = {https://nvd.nist.gov/vuln/detail/CVE-2018-0150}
|
||
}
|
||
|
||
@misc{CVE-2019-12649,
|
||
key = {CVE-2019-12649},
|
||
title = {{CVE-2019-12649}},
|
||
howpublished = {National Vulnerability Database},
|
||
institution = {NIST},
|
||
day = 25,
|
||
month = {September},
|
||
year = 2019,
|
||
note = {\url{https://nvd.nist.gov/vuln/detail/CVE-2019-12649}},
|
||
url = {https://nvd.nist.gov/vuln/detail/CVE-2019-12649}
|
||
}
|
||
|
||
@misc{CVE-2019-12651,
|
||
key = {CVE-2019-12651},
|
||
title = {{CVE-2019-12651}},
|
||
howpublished = {National Vulnerability Database},
|
||
institution = {NIST},
|
||
day = 25,
|
||
month = {September},
|
||
year = 2019,
|
||
note = {\url{https://nvd.nist.gov/vuln/detail/CVE-2019-12651}},
|
||
url = {https://nvd.nist.gov/vuln/detail/CVE-2019-12651}
|
||
}
|
||
|
||
@MISC {citrix2020,
|
||
author = "William Ballenthin and Josh Madeley",
|
||
title = {{"404 Exploit Not Found: Vigilante Deploying Mitigation for Citrix NetScaler Vulnerability While Maintaining Backdoor"}},
|
||
month = jan,
|
||
year = "2020",
|
||
note = "https://www.fireeye.com/blog/threat-research/2020/01/vigilante-deploying-mitigation-for-citrix-netscaler-vulnerability-while-maintaining-backdoor.html"
|
||
}
|
||
|
||
@MISC {kimwillsher2009,
|
||
author = "Kim Willsher",
|
||
title = "French fighter planes grounded by computer virus",
|
||
month = feb,
|
||
year = "2009",
|
||
note = "https://www.telegraph.co.uk/news/worldnews/europe/france/4547649/French-fighter-planes-grounded-by-computer-virus.html"
|
||
}
|
||
|
||
@article{chaplain2018weapon,
|
||
title={{Weapon Systems Cybersecurity: DoD just beginning to grapple with scale of vulnerabilities}},
|
||
author={Chaplain, Christina},
|
||
journal={Washington, DC, USA, GAO Report No. GAO-19-128},
|
||
year={2018}
|
||
}
|
||
|
||
|
||
@MISC {mitre2020,
|
||
author = "MITRE",
|
||
title = "Common Vulnerabilities and Exposures",
|
||
month = jan,
|
||
year = "2020",
|
||
note = "Data aggregated from https://cve.mitre.org/"
|
||
}
|
||
|
||
@MISC {uscert2014,
|
||
author = "US CERT",
|
||
title = {{"ICS Alert (ICS-ALERT-14-281-01E): Ongoing Sophisticated Malware Campaign Compromising ICS"}},
|
||
month = dec,
|
||
year = "2014",
|
||
note = "https://www.us-cert.gov/ics/alerts/ICS-ALERT-14-281-01B"
|
||
}
|
||
|
||
@MISC {uscert2016,
|
||
author = "US CERT",
|
||
title = {{"ICS Alert (IR-ALERT-H-16-056-01): Cyber-Attack Against Ukrainian Critical Infrastructure"}},
|
||
month = feb,
|
||
year = "2016",
|
||
note = "https://www.us-cert.gov/ics/alerts/IR-ALERT-H-16-056-01"
|
||
}
|
||
|
||
@MISC {uscert2017,
|
||
author = "US CERT",
|
||
title = {{"Alert (TA17-293A): Advanced Persistent Threat Activity Targeting Energy and Other Critical Infrastructure Sectors"}},
|
||
month = oct,
|
||
year = "2017",
|
||
note = "https://www.us-cert.gov/ncas/alerts/TA17-293A"
|
||
}
|
||
|
||
@MISC {alexandercampbellvickramsingh2019,
|
||
author = "Alexander Campbell, Vickram Singh",
|
||
title = "Lessons from the cyberattack on {I}ndia’s largest nuclear power plant",
|
||
month = nov,
|
||
year = "2019",
|
||
note = "https://thebulletin.org/2019/11/lessons-from-the-cyberattack-on-indias-largest-nuclear-power-plant/"
|
||
}
|
||
|
||
@article{langner2011stuxnet,
|
||
title={{Stuxnet: Dissecting a cyberwarfare weapon}},
|
||
author={Langner, Ralph},
|
||
journal={IEEE Security \& Privacy},
|
||
volume={9},
|
||
number={3},
|
||
pages={49--51},
|
||
year={2011},
|
||
publisher={IEEE}
|
||
}
|
||
|
||
|
||
@MISC {charlesarthur2011,
|
||
author = "Charles Arthur",
|
||
title = "Chinese hackers suspected of interfering with {US} satellites",
|
||
month = oct,
|
||
year = "2011",
|
||
note = "https://www.theguardian.com/technology/2011/oct/27/chinese-hacking-us-satellites-suspected"
|
||
}
|
||
|
||
@MISC {thierrynoisette2009,
|
||
author = "Thierry Noisette",
|
||
title = "S\'ecurit\'e : la Marine victime du virus Conficker-Downadup",
|
||
month = feb,
|
||
year = "2009",
|
||
note = "https://www.zdnet.fr/actualites/securite-la-marine-victime-du-virus-conficker-downadup-39387036.htm"
|
||
}
|
||
|
||
@misc{cve,
|
||
title = {CVE Cisco},
|
||
author = {The MITRE Corporation},
|
||
howpublished = {\url{https://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=cisco+}},
|
||
note = {Search Results for: Cisco, Juniper, HPE. Retrieved December 17, 2019.},
|
||
}
|
||
|
||
@misc{cost_outage,
|
||
title = {Cost of Data Center Outages.},
|
||
howpublished = {\url{https://www.vertiv.com/globalassets/documents/reports/2016-cost-of-data-center-outages-11-11_51190_1.pdf}},
|
||
author = {Ponemon Institute LLC.},
|
||
month = {January},
|
||
year = {2016},
|
||
}
|
||
|
||
@misc{cost_downtime,
|
||
title = {The real cost of downtime.},
|
||
howpublished = {\url{https://devops.com/real-cost-downtime/}},
|
||
author = {Shimel, A.},
|
||
year = {2015},
|
||
month = {February},
|
||
}
|
||
|
||
@misc{shadowhammer,
|
||
title = {Shadowhammer Backdoor},
|
||
author = {Dellinger, AJ},
|
||
howpublished = {\url{https://www.engadget.com/2019/03/25/asus-hack-shadowhammer-backdoor/}},
|
||
}
|
||
|
||
@inproceedings{UCRDTW,
|
||
author = {Rakthanmanon, Thanawin and Campana, Bilson and Mueen, Abdullah and Batista, Gustavo and Westover, Brandon and Zhu, Qiang and Zakaria, Jesin and Keogh, Eamonn},
|
||
title = {Searching and Mining Trillions of Time Series Subsequences under Dynamic Time Warping},
|
||
year = {2012},
|
||
isbn = {9781450314626},
|
||
publisher = {Association for Computing Machinery},
|
||
address = {New York, NY, USA},
|
||
url = {https://doi.org/10.1145/2339530.2339576},
|
||
doi = {10.1145/2339530.2339576},
|
||
booktitle = {Proceedings of the 18th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining},
|
||
pages = {262–270},
|
||
numpages = {9},
|
||
series = {KDD ’12}
|
||
}
|
||
|
||
@inproceedings {ICISSP2017,
|
||
title = {On the Security of Safety-Critical Embedded Systems: Who Watches the Watchers? Who Reprograms the Watchers?},
|
||
booktitle = {International Conference on Information Systems Security and Privacy (ICISSP)},
|
||
year = {2017},
|
||
author = {Carlos Moreno and Sebastian Fischmeister}
|
||
}
|
||
|
||
|
||
|
||
|
||
|
||
% Surveys of IDS
|
||
@article{Khraisat2019,
|
||
author="Khraisat, Ansam
|
||
and Gondal, Iqbal
|
||
and Vamplew, Peter
|
||
and Kamruzzaman, Joarder",
|
||
title="Survey of intrusion detection systems: techniques, datasets and challenges",
|
||
journal="Cybersecurity",
|
||
year="2019",
|
||
month="Jul",
|
||
day="17",
|
||
volume="2",
|
||
number="1",
|
||
pages="20",
|
||
issn="2523-3246",
|
||
doi="10.1186/s42400-019-0038-7",
|
||
url="https://doi.org/10.1186/s42400-019-0038-7"
|
||
}
|
||
|
||
%cited
|
||
@Inbook{Hamed2018,
|
||
author="Hamed, Tarfa
|
||
and Ernst, Jason B.
|
||
and Kremer, Stefan C.",
|
||
title="A Survey and Taxonomy on Data and Pre-processing Techniques of Intrusion Detection Systems",
|
||
bookTitle="Computer and Network Security Essentials",
|
||
year="2018",
|
||
publisher="Springer International Publishing",
|
||
address="Cham",
|
||
pages="113--134",
|
||
isbn="978-3-319-58424-9",
|
||
doi="10.1007/978-3-319-58424-9_7",
|
||
url="https://doi.org/10.1007/978-3-319-58424-9_7"
|
||
}
|
||
|
||
@article{dolphin,
|
||
title={DolphinAttack},
|
||
ISBN={9781450349468},
|
||
url={http://dx.doi.org/10.1145/3133956.3134052},
|
||
DOI={10.1145/3133956.3134052},
|
||
journal={Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security - CCS ’17},
|
||
publisher={ACM Press},
|
||
author={Zhang, Guoming and Yan, Chen and Ji, Xiaoyu and Zhang, Tianchen and Zhang, Taimin and Xu, Wenyuan},
|
||
year={2017}
|
||
}
|
||
|
||
|
||
% Survey of classic intrusion detection techniques.
|
||
|
||
%cited
|
||
@INPROCEEDINGS{7210351,
|
||
author={L. {Dali} and A. {Bentajer} and E. {Abdelmajid} and K. {Abouelmehdi} and H. {Elsayed} and E. {Fatiha} and B. {Abderahim}},
|
||
booktitle={2015 2nd World Symposium on Web Applications and Networking (WSWAN)},
|
||
title={A survey of intrusion detection system},
|
||
year={2015},
|
||
pages={1-6},
|
||
doi={10.1109/WSWAN.2015.7210351},
|
||
ISSN={null},
|
||
month={March}
|
||
}
|
||
|
||
%cited
|
||
@article{LIAO201316,
|
||
title = "Intrusion detection system: A comprehensive review",
|
||
journal = "Journal of Network and Computer Applications",
|
||
volume = "36",
|
||
number = "1",
|
||
pages = "16 - 24",
|
||
year = "2013",
|
||
issn = "1084-8045",
|
||
doi = "https://doi.org/10.1016/j.jnca.2012.09.004",
|
||
url = "http://www.sciencedirect.com/science/article/pii/S1084804512001944",
|
||
author = "Hung-Jen Liao and Chun-Hung Richard Lin and Ying-Chih Lin and Kuang-Yuan Tung"
|
||
}
|
||
|
||
%cited
|
||
@article{LUNT1993405,
|
||
title = "A survey of intrusion detection techniques",
|
||
journal = "Computers \& Security",
|
||
volume = "12",
|
||
number = "4",
|
||
pages = "405 - 418",
|
||
year = "1993",
|
||
issn = "0167-4048",
|
||
doi = "https://doi.org/10.1016/0167-4048(93)90029-5",
|
||
url = "http://www.sciencedirect.com/science/article/pii/0167404893900295",
|
||
author = "Teresa F. Lunt"
|
||
}
|
||
|
||
%cited
|
||
@article{10.1145/2542049,
|
||
author = {Mitchell, Robert and Chen, Ing-Ray},
|
||
title = {A Survey of Intrusion Detection Techniques for Cyber-Physical Systems},
|
||
year = {2014},
|
||
issue_date = {April 2014},
|
||
publisher = {Association for Computing Machinery},
|
||
address = {New York, NY, USA},
|
||
volume = {46},
|
||
number = {4},
|
||
issn = {0360-0300},
|
||
url = {https://doi.org/10.1145/2542049},
|
||
doi = {10.1145/2542049},
|
||
journal = {ACM Comput. Surv.},
|
||
month = mar,
|
||
articleno = {Article 55},
|
||
numpages = {29},
|
||
}
|
||
|
||
%cited
|
||
@article{AGRAWAL2015708,
|
||
title = "Survey on Anomaly Detection using Data Mining Techniques",
|
||
journal = "Procedia Computer Science",
|
||
volume = "60",
|
||
pages = "708 - 713",
|
||
year = "2015",
|
||
note = "Knowledge-Based and Intelligent Information \& Engineering Systems 19th Annual Conference, KES-2015, Singapore, September 2015 Proceedings",
|
||
issn = "1877-0509",
|
||
doi = "https://doi.org/10.1016/j.procs.2015.08.220",
|
||
url = "http://www.sciencedirect.com/science/article/pii/S1877050915023479",
|
||
author = "Shikha Agrawal and Jitendra Agrawal"
|
||
}
|
||
|
||
%cited
|
||
@article{KOLIAS2011625,
|
||
title = "Swarm intelligence in intrusion detection: A survey",
|
||
journal = "Computers \& Security",
|
||
volume = "30",
|
||
number = "8",
|
||
pages = "625 - 642",
|
||
year = "2011",
|
||
issn = "0167-4048",
|
||
doi = "https://doi.org/10.1016/j.cose.2011.08.009",
|
||
url = "http://www.sciencedirect.com/science/article/pii/S016740481100109X",
|
||
author = "C. Kolias and G. Kambourakis and M. Maragoudakis"
|
||
}
|
||
|
||
%cited
|
||
@INPROCEEDINGS{1598592,
|
||
author={A. {Murali} and M. {Rao}},
|
||
booktitle={2005 International Conference on Information and Communication Technologies},
|
||
title={A Survey on Intrusion Detection Approaches},
|
||
year={2005},
|
||
volume={},
|
||
number={},
|
||
pages={233-240},
|
||
doi={10.1109/ICICT.2005.1598592},
|
||
ISSN={null},
|
||
month={Aug},
|
||
}
|
||
|
||
%cited
|
||
@INPROCEEDINGS{6158822,
|
||
author={D. K. {Denatious} and A. {John}},
|
||
booktitle={2012 International Conference on Computer Communication and Informatics},
|
||
title={Survey on data mining techniques to enhance intrusion detection},
|
||
year={2012},
|
||
volume={},
|
||
number={},
|
||
pages={1-5},
|
||
doi={10.1109/ICCCI.2012.6158822},
|
||
ISSN={null},
|
||
month={Jan}
|
||
}
|
||
|
||
%cited
|
||
@ARTICLE{7307098,
|
||
author={A. L. {Buczak} and E. {Guven}},
|
||
journal={IEEE Communications Surveys Tutorials},
|
||
title={A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection},
|
||
year={2016},
|
||
volume={18},
|
||
number={2},
|
||
pages={1153-1176},
|
||
doi={10.1109/COMST.2015.2494502},
|
||
ISSN={2373-745X},
|
||
month={Secondquarter}
|
||
}
|
||
|
||
%cited
|
||
@INPROCEEDINGS{143785,
|
||
author={N. {McAuliffe} and D. {Wolcott} and L. {Schaefer} and N. {Kelem} and B. {Hubbard} and T. {Haley}},
|
||
booktitle={[1990] Proceedings of the Sixth Annual Computer Security Applications Conference},
|
||
title={Is your computer being misused? A survey of current intrusion detection system technology},
|
||
year={1990},
|
||
volume={},
|
||
number={},
|
||
pages={260-272},
|
||
doi={10.1109/CSAC.1990.143785},
|
||
ISSN={null},
|
||
month={Dec}
|
||
}
|
||
|
||
%cited
|
||
@article{2808691,
|
||
author = {Milenkoski, Aleksandar and Vieira, Marco and Kounev, Samuel and Avritzer, Alberto and Payne, Bryan D.},
|
||
title = {Evaluating Computer Intrusion Detection Systems: A Survey of Common Practices},
|
||
year = {2015},
|
||
issue_date = {September 2015},
|
||
publisher = {Association for Computing Machinery},
|
||
address = {New York, NY, USA},
|
||
volume = {48},
|
||
number = {1},
|
||
issn = {0360-0300},
|
||
url = {https://doi.org/10.1145/2808691},
|
||
doi = {10.1145/2808691},
|
||
journal = {ACM Comput. Surv.},
|
||
month = sep,
|
||
articleno = {Article 12},
|
||
numpages = {41},
|
||
}
|
||
|
||
%cited
|
||
@ARTICLE{7935369,
|
||
author={J. {Giraldo} and E. {Sarkar} and A. A. {Cardenas} and M. {Maniatakos} and M. {Kantarcioglu}},
|
||
journal={IEEE Design Test},
|
||
title={Security and Privacy in Cyber-Physical Systems: A Survey of Surveys},
|
||
year={2017},
|
||
volume={34},
|
||
number={4},
|
||
pages={7-17},
|
||
doi={10.1109/MDAT.2017.2709310},
|
||
ISSN={2168-2364},
|
||
month={Aug}
|
||
}
|
||
|
||
|
||
%cited
|
||
@INPROCEEDINGS{4557881,
|
||
author={S. {Owais} and V. {Snasel} and P. {Kromer} and A. {Abraham}},
|
||
booktitle={2008 7th Computer Information Systems and Industrial Management Applications},
|
||
title={Survey: Using Genetic Algorithm Approach in Intrusion Detection Systems Techniques},
|
||
year={2008},
|
||
pages={300-307},
|
||
doi={10.1109/CISIM.2008.49},
|
||
ISSN={null},
|
||
month={June}
|
||
}
|
||
|
||
@article{Hernandez2014SmartNT,
|
||
title={Smart nest thermostat: A smart spy in your home},
|
||
author={Hernandez, Grant and Arias, Orlando and Buentello, Daniel and Jin, Yier},
|
||
journal={Black Hat USA},
|
||
pages={1--8},
|
||
year={2014}
|
||
}
|
||
|
||
%%!!DUPLICATE!!
|
||
@misc{greenberg_2018,
|
||
title={Router-Hacking "Slingshot" Spy Operation Compromised More Than 100 Targets},
|
||
url={https://www.wired.com/story/router-hacking-slingshot-spy-operation-compromised-more-than-100-targets/},
|
||
journal={Wired},
|
||
publisher={Conde Nast},
|
||
author={Greenberg, Andy},
|
||
year={2018},
|
||
month={Mar}
|
||
}
|
||
|
||
@misc{kovacs_2019,
|
||
title={Cisco Firewall Exploited in Attack on {U.S.} Renewable Energy Firm},
|
||
note={\\
|
||
\href{https://www.securityweek.com/cisco-firewall-vulnerability-exploited-attack-us-renewable-energy-provider}
|
||
{\nolinkurl{https://www.securityweek.com/cisco-firewall-vulnerability-exploited}}
|
||
\\
|
||
\href{https://www.securityweek.com/cisco-firewall-vulnerability-exploited-attack-us-renewable-energy-provider}
|
||
{\nolinkurl{-attack-us-renewable-energy-provider}}
|
||
},
|
||
journal={SecurityWeek},
|
||
author={Kovacs, Eduard},
|
||
year={2019},
|
||
month={Nov}
|
||
}
|
||
|
||
@INPROCEEDINGS {liuacoustic,
|
||
author = {A. X. Liu and L. Xiao and K. Pongaliur and L. Kempel and Z. Abraham},
|
||
booktitle = {2008 IEEE 11th High-Assurance Systems Engineering Symposium},
|
||
title = {Securing Sensor Nodes Against Side Channel Attacks},
|
||
year = {2008},
|
||
volume = {},
|
||
issn = {1530-2059},
|
||
pages = {353-361},
|
||
keywords = {sensor;network;security;side-channel},
|
||
doi = {10.1109/HASE.2008.26},
|
||
url = {https://doi.ieeecomputersociety.org/10.1109/HASE.2008.26},
|
||
publisher = {IEEE Computer Society},
|
||
address = {Los Alamitos, CA, USA},
|
||
month = {dec}
|
||
}
|
||
|
||
@article{hanilci2011recognition,
|
||
title={Recognition of brand and models of cell-phones from recorded speech signals},
|
||
author={Hanilci, Cemal and Ertas, Figen and Ertas, Tuncay and Eskidere, {\"O}mer},
|
||
journal={IEEE Transactions on Information Forensics and Security},
|
||
volume={7},
|
||
number={2},
|
||
pages={625--634},
|
||
year={2011},
|
||
publisher={IEEE}
|
||
}
|
||
|
||
@INPROCEEDINGS{4488501,
|
||
author={H. {Zhengbing} and S. {Jun} and V. P. {Shirochin}},
|
||
booktitle={2007 4th IEEE Workshop on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications},
|
||
title={An Intelligent Lightweight Intrusion Detection System with Forensics Technique},
|
||
year={2007},
|
||
volume={},
|
||
number={},
|
||
pages={647-651},}
|
||
|
||
@article{zhai2015method,
|
||
title={A method for detecting abnormal program behavior on embedded devices},
|
||
author={Zhai, Xiaojun and Appiah, Kofi and Ehsan, Shoaib and Howells, Gareth and Hu, Huosheng and Gu, Dongbing and McDonald-Maier, Klaus D},
|
||
journal={IEEE Transactions on Information Forensics and Security},
|
||
volume={10},
|
||
number={8},
|
||
pages={1692--1704},
|
||
year={2015},
|
||
publisher={IEEE}
|
||
}
|
||
|
||
@INPROCEEDINGS{7479068,
|
||
author={M. A. {Al Faruque} and S. R. {Chhetri} and A. {Canedo} and J. {Wan}},
|
||
booktitle={2016 ACM/IEEE 7th International Conference on Cyber-Physical Systems (ICCPS)},
|
||
title={Acoustic Side-Channel Attacks on Additive Manufacturing Systems},
|
||
year={2016},
|
||
volume={},
|
||
number={},
|
||
pages={1-10},}
|
||
|
||
|
||
@article{vcagalj2014timing,
|
||
title={Timing attacks on cognitive authentication schemes},
|
||
author={{\v{C}}agalj, Mario and Perkovi{\'c}, Toni and Bugari{\'c}, Marin},
|
||
journal={IEEE Transactions on Information Forensics and Security},
|
||
volume={10},
|
||
number={3},
|
||
pages={584--596},
|
||
year={2014},
|
||
publisher={IEEE}
|
||
}
|
||
|
||
|
||
@INPROCEEDINGS {,
|
||
author = {A. X. Liu and L. Xiao and K. Pongaliur and L. Kempel and Z. Abraham},
|
||
booktitle = {2008 IEEE 11th High-Assurance Systems Engineering Symposium},
|
||
title = {Securing Sensor Nodes Against Side Channel Attacks},
|
||
year = {2008},
|
||
volume = {},
|
||
issn = {1530-2059},
|
||
pages = {353-361},
|
||
keywords = {sensor;network;security;side-channel},
|
||
doi = {10.1109/HASE.2008.26},
|
||
url = {https://doi.ieeecomputersociety.org/10.1109/HASE.2008.26},
|
||
publisher = {IEEE Computer Society},
|
||
address = {Los Alamitos, CA, USA},
|
||
month = {dec}
|
||
}
|
||
|
||
|
||
@misc{symantec_security_response,
|
||
key={sym},
|
||
title={Thousands of Ubiquiti AirOS routers hit with worm attacks},
|
||
note={\\
|
||
\href{https://www.symantec.com/connect/fr/blogs/thousands-ubiquiti-airos-routers-hit-worm-attacks-airos-routers}
|
||
{\nolinkurl{https://www.symantec.com/connect/fr/blogs/thousands-ubiquiti-airos-routers}
|
||
\\
|
||
\nolinkurl{-hit-worm-attacks-airos-routers}
|
||
}
|
||
},
|
||
author={Symantec Security Response},
|
||
publisher={Symantec Security Response},
|
||
year={2016},
|
||
month={May},
|
||
day={9}
|
||
}
|
||
|
||
|
||
|
||
%Side channel IDS
|
||
@inproceedings{Aubel,
|
||
title={Side-channel based intrusion detection for industrial control systems},
|
||
author={Van Aubel, Pol and Papagiannopoulos, Kostas and Chmielewski, {\L}ukasz and Doerr, Christian},
|
||
booktitle={International Conference on Critical Information Infrastructures Security},
|
||
pages={207--224},
|
||
year={2017},
|
||
organization={Springer}
|
||
}
|
||
|
||
@Article{Zantout,
|
||
author="Zantout, Salam and Al Faruque, Mohammad",
|
||
title="Hardware Trojan Detection in FPGA through Side-Channel Power Analysis and Machine Learning",
|
||
year="2018",
|
||
}
|
||
|
||
%Classic side channel
|
||
@inproceedings{Kocher,
|
||
title={Differential power analysis},
|
||
author={Kocher, Paul and Jaffe, Joshua and Jun, Benjamin},
|
||
booktitle={Annual International Cryptology Conference},
|
||
pages={388--397},
|
||
year={1999},
|
||
organization={Springer}
|
||
}
|
||
|
||
@inproceedings{Camurati,
|
||
title={Screaming channels: When electromagnetic side channels meet radio transceivers},
|
||
author={Camurati, Giovanni and Poeplau, Sebastian and Muench, Marius and Hayes, Tom and Francillon, Aur{\'e}lien},
|
||
booktitle={Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security},
|
||
pages={163--177},
|
||
year={2018}
|
||
}
|
||
|
||
@ARTICLE{8509150,
|
||
author={C. {Luo} and Y. {Fei} and A. A. {Ding} and P. {Closas}},
|
||
journal={IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems},
|
||
title={Comprehensive Side-Channel Power Analysis of XTS-AES},
|
||
year={2019},
|
||
volume={38},
|
||
number={12},
|
||
pages={2191-2200},
|
||
doi={10.1109/TCAD.2018.2878171},
|
||
ISSN={1937-4151},
|
||
month={Dec}
|
||
}
|
||
|
||
% Cool / interesting
|
||
|
||
@INPROCEEDINGS{8590946,
|
||
author={R. {Matsumura} and T. {Sugawara} and K. {Sakiyama}},
|
||
booktitle={2018 Sixth International Symposium on Computing and Networking Workshops (CANDARW)},
|
||
title={A Secure LiDAR with AES-Based Side-Channel Fingerprinting},
|
||
year={2018},
|
||
volume={},
|
||
number={},
|
||
pages={479-482},
|
||
doi={10.1109/CANDARW.2018.00092},
|
||
ISSN={null},
|
||
month={Nov}
|
||
}
|
||
|
||
% Also:
|
||
%% Removed Duplicate Moreno2018 (JD)
|
||
|
||
@inproceedings{10.1145/2465554.2465570,
|
||
author = {Moreno, Carlos and Fischmeister, Sebastian and Hasan, M. Anwar},
|
||
title = {Non-Intrusive Program Tracing and Debugging of Deployed Embedded Systems through Side-Channel Analysis},
|
||
year = {2013},
|
||
isbn = {9781450320856},
|
||
publisher = {Association for Computing Machinery},
|
||
address = {New York, NY, USA},
|
||
url = {https://doi.org/10.1145/2465554.2465570},
|
||
doi = {10.1145/2465554.2465570},
|
||
booktitle = {Proceedings of the 14th ACM SIGPLAN/SIGBED Conference on Languages, Compilers and Tools for Embedded Systems},
|
||
pages = {77–88},
|
||
numpages = {12},
|
||
location = {Seattle, Washington, USA},
|
||
series = {LCTES ’13}
|
||
}
|
||
|
||
@INPROCEEDINGS{8342184,
|
||
author={K. {Lamichhane} and C. {Moreno} and S. {Fischmeister}},
|
||
booktitle={2018 Design, Automation Test in Europe Conference Exhibition (DATE)},
|
||
title={Non-intrusive program tracing of non-preemptive multitasking systems using power consumption},
|
||
year={2018},
|
||
volume={},
|
||
number={},
|
||
pages={1147-1150},
|
||
doi={10.23919/DATE.2018.8342184},
|
||
ISSN={1558-1101},
|
||
month={March}
|
||
}
|
||
|
||
@InProceedings{10.1007/978-3-319-04283-1_18,
|
||
author="Msgna, Mehari and Markantonakis, Konstantinos and Mayes, Keith",
|
||
editor="Zia, Tanveer and Zomaya, Albert and Varadharajan, Vijay and Mao, Morley",
|
||
title = "{The B-Side of Side Channel Leakage: Control Flow Security in Embedded Systems}",
|
||
booktitle="Security and Privacy in Communication Networks",
|
||
year="2013",
|
||
publisher="Springer International Publishing",
|
||
address="Cham",
|
||
pages="288--304",
|
||
}
|
||
|
||
@INPROCEEDINGS{8192483,
|
||
author={A. {Nazari} and N. {Sehatbakhsh} and M. {Alam} and A. {Zajic} and M. {Prvulovic}},
|
||
booktitle={2017 ACM/IEEE 44th Annual International Symposium on Computer Architecture (ISCA)},
|
||
title="{EDDIE: EM-based detection of deviations in program execution}",
|
||
year={2017},
|
||
volume={},
|
||
number={},
|
||
pages={333-346},
|
||
doi={10.1145/3079856.3080223},
|
||
ISSN={null},
|
||
month={June}
|
||
}
|
||
|
||
@article{sehatbakhsh2019remote,
|
||
title={REMOTE: Robust External Malware Detection Framework by Using Electromagnetic Signals},
|
||
author={Sehatbakhsh, Nader and Nazari, Alireza and Alam, Monjur and Werner, Frank and Zhu, Yuanda and Zajic, Alenka and Prvulovic, Milos},
|
||
journal={IEEE Transactions on Computers},
|
||
year={2019},
|
||
publisher={IEEE}
|
||
}
|
||
|
||
@inproceedings{xie2017aggregated,
|
||
title={Aggregated Residual Transformations for Deep Neural Networks},
|
||
author={Xie, Saining and Girshick, Ross and Doll{\'a}r, Piotr and Tu, Zhuowen and He, Kaiming},
|
||
booktitle={Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition},
|
||
pages={1492--1500},
|
||
year={2017}
|
||
}
|
||
|
||
@inproceedings{yilmaz2019detecting,
|
||
title={Detecting Cellphone Camera Status at Distance by Exploiting Electromagnetic Emanations},
|
||
author={Yilmaz, Baki Berkay and Ugurlu, Elvan Mert and Prvulovic, Milos and Zajic, Alenka},
|
||
booktitle={MILCOM 2019-2019 IEEE Military Communications Conference (MILCOM)},
|
||
pages={1--6},
|
||
year={2019},
|
||
organization={IEEE}
|
||
}
|
||
|
||
@inproceedings {179223,
|
||
author = {Shane S. Clark and Benjamin Ransford and Amir Rahmati and Shane Guineau and Jacob Sorber and Wenyuan Xu and Kevin Fu},
|
||
title = "{WattsUpDoc: Power Side Channels to Nonintrusively Discover Untargeted Malware on Embedded Medical Devices}",
|
||
booktitle = "2013 {USENIX} Workshop on Health Information Technologies",
|
||
year = {2013},
|
||
address = {Washington, D.C.},
|
||
url = {https://www.usenix.org/conference/healthtech13/workshop-program/presentation/Clark},
|
||
publisher = "{USENIX}",
|
||
}
|
||
|
||
@InProceedings{Acoustic_Cryptanalysis,
|
||
author="Genkin, Daniel and Shamir, Adi and Tromer, Eran",
|
||
editor="Garay, Juan A. and Gennaro, Rosario",
|
||
title="{RSA} Key Extraction via Low-Bandwidth Acoustic Cryptanalysis",
|
||
booktitle="Advances in Cryptology -- CRYPTO 2014",
|
||
year="2014",
|
||
publisher="Springer Berlin Heidelberg",
|
||
address="Berlin, Heidelberg",
|
||
pages="444--461",
|
||
isbn="978-3-662-44371-2"
|
||
}
|
||
|
||
@inbook{Eisenbarth,
|
||
title = "{Building a Side Channel Based Disassembler}",
|
||
publisher={Springer Berlin Heidelberg},
|
||
author={Eisenbarth, Thomas and Paar, Christof and Weghenkel, Bj\"{o}rn},
|
||
booktitle="{Transactions on Computational Science X: Special Issue on Security in Computing, Part I}",
|
||
pages={78-99},
|
||
year = 2010
|
||
}
|
||
|
||
@misc{router_hacking_slingshot,
|
||
title = {Router-Hacking ``Slingshot'' Spy Operation Compromised More Than 100 Targets},
|
||
note={\\
|
||
\href{https://www.wired.com/story/router-hacking-slingshot-spy-operation-compromised-more-than-100-targets/}
|
||
{\nolinkurl{https://www.wired.com/story/router-hacking-slingshot-spy-operation}}
|
||
\\
|
||
\href{https://www.wired.com/story/router-hacking-slingshot-spy-operation-compromised-more-than-100-targets/}
|
||
{\nolinkurl{-compromised-more-than-100-targets/}}
|
||
},
|
||
journal = {Wired},
|
||
author = {Greenberg, Andy},
|
||
year = {2018},
|
||
month = {March},
|
||
}
|
||
|
||
@misc{nsa_prefers_hacking_routers,
|
||
title = "{NSA} Laughs at {PCs}, Prefers Hacking Routers and Switches",
|
||
howpublished = {\url{https://www.wired.com/2013/09/nsa-router-hacking/}},
|
||
author = {Zetter, Kim},
|
||
year = {2013},
|
||
month = {September},
|
||
}
|
||
|
||
@misc{unpatched_routers_prox_yarmy,
|
||
title = {Unpatched routers being used to build vast proxy army, spy on networks},
|
||
howpublished = {\url{https://arstechnica.com/information-technology/2018/09/unpatched-routers-being-used-to-build-vast-proxy-army-spy-on-networks/}},
|
||
author = {Gallagher, Sean},
|
||
year = {2018},
|
||
month = {September},
|
||
}
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
@InProceedings{10.1007/3-540-36400-5_4,
|
||
author="Agrawal, Dakshi
|
||
and Archambeault, Bruce
|
||
and Rao, Josyula R.
|
||
and Rohatgi, Pankaj",
|
||
editor="Kaliski, Burton S.
|
||
and Ko{\c{c}}, {\c{c}}etin K.
|
||
and Paar, Christof",
|
||
title="The EM Side---Channel(s)",
|
||
booktitle="Cryptographic Hardware and Embedded Systems - CHES 2002",
|
||
year="2003",
|
||
publisher="Springer Berlin Heidelberg",
|
||
address="Berlin, Heidelberg",
|
||
pages="29--45",
|
||
}
|
||
|
||
@article{printers,
|
||
title = {Acoustic Side-Channel Attacks on Printers},
|
||
author = {Michael Backes, Markus Dürmuth, Sebastian Gerling, Manfred Pinkal, Caroline Sporleder},
|
||
year = {2010},
|
||
publisher = {https://www.usenix.org/legacy/event/sec10/tech/full_papers/Backes.pdf},
|
||
}
|
||
|
||
@article{10.1145/1609956.1609959,
|
||
author = {Zhuang, Li and Zhou, Feng and Tygar, J. D.},
|
||
title = {Keyboard Acoustic Emanations Revisited},
|
||
year = {2009},
|
||
issue_date = {October 2009},
|
||
publisher = {Association for Computing Machinery},
|
||
address = {New York, NY, USA},
|
||
volume = {13},
|
||
number = {1},
|
||
issn = {1094-9224},
|
||
url = {https://doi.org/10.1145/1609956.1609959},
|
||
doi = {10.1145/1609956.1609959},
|
||
journal = {ACM Trans. Inf. Syst. Secur.},
|
||
month = nov,
|
||
articleno = {Article 3},
|
||
numpages = {26},
|
||
keywords = {privacy, cepstrum, learning theory, signal analysis, acoustic manations, Computer security, HMM, human factors, keyboards, hidden markov models, electronic eavesdropping}
|
||
}
|
||
|
||
@InProceedings{10.1007/3-540-68697-5_9,
|
||
author="Kocher, Paul C.",
|
||
editor="Koblitz, Neal",
|
||
title="Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems",
|
||
booktitle="Advances in Cryptology --- CRYPTO '96",
|
||
year="1996",
|
||
publisher="Springer Berlin Heidelberg",
|
||
address="Berlin, Heidelberg",
|
||
pages="104--113",
|
||
}
|
||
|
||
|
||
|
||
|
||
|
||
|
||
@article{VINCENT201577,
|
||
title = "Trojan Detection and Side-channel Analyses for Cyber-security in Cyber-physical Manufacturing Systems",
|
||
journal = "Procedia Manufacturing",
|
||
volume = "1",
|
||
pages = "77 - 85",
|
||
year = "2015",
|
||
note = "43rd North American Manufacturing Research Conference, NAMRC 43, 8-12 June 2015, UNC Charlotte, North Carolina, United States",
|
||
issn = "2351-9789",
|
||
doi = "https://doi.org/10.1016/j.promfg.2015.09.065",
|
||
url = "http://www.sciencedirect.com/science/article/pii/S2351978915010653",
|
||
author = "Hannah Vincent and Lee Wells and Pablo Tarazaga and Jaime Camelio",
|
||
keywords = "Cyber-Attack detection, Cyber-Physical manufacturing systems, Quality control, Side-Channel analyses, Structural Health Monitoring, Trojans",
|
||
}
|
||
|
||
|
||
@inproceedings{fuller2018exploiting,
|
||
title={Exploiting side-channel emissions to detect changes in FPGA firmware},
|
||
author={Fuller, Ryan M and Riley, Ronald A and Graham, James T},
|
||
booktitle={Cyber Sensing 2018},
|
||
volume={10630},
|
||
pages={106300A},
|
||
year={2018},
|
||
organization={International Society for Optics and Photonics}
|
||
}
|
||
|
||
@article{hospodar2011machine,
|
||
title={Machine learning in side-channel analysis: a first study},
|
||
author={Hospodar, Gabriel and Gierlichs, Benedikt and De Mulder, Elke and Verbauwhede, Ingrid and Vandewalle, Joos},
|
||
journal={Journal of Cryptographic Engineering},
|
||
volume={1},
|
||
number={4},
|
||
pages={293},
|
||
year={2011},
|
||
publisher={Springer}
|
||
}
|
||
|
||
@inproceedings{moreno2016non,
|
||
title={Non-intrusive runtime monitoring through power consumption: a signals and system analysis approach to reconstruct the trace},
|
||
author={Moreno, Carlos and Fischmeister, Sebastian},
|
||
booktitle={International Conference on Runtime Verification},
|
||
pages={268--284},
|
||
year={2016},
|
||
organization={Springer}
|
||
}
|
||
|
||
|
||
|
||
|
||
@inproceedings{picek2017climbing,
|
||
title={Climbing down the hierarchy: hierarchical classification for machine learning side-channel attacks},
|
||
author={Picek, Stjepan and Heuser, Annelie and Jovic, Alan and Legay, Axel},
|
||
booktitle={International Conference on Cryptology in Africa},
|
||
pages={61--78},
|
||
year={2017},
|
||
organization={Springer}
|
||
}
|
||
|
||
@inproceedings{picek2018performance,
|
||
title={On the performance of convolutional neural networks for side-channel analysis},
|
||
author={Picek, Stjepan and Samiotis, Ioannis Petros and Kim, Jaehun and Heuser, Annelie and Bhasin, Shivam and Legay, Axel},
|
||
booktitle={International Conference on Security, Privacy, and Applied Cryptography Engineering},
|
||
pages={157--176},
|
||
year={2018},
|
||
organization={Springer}
|
||
}
|
||
|
||
@article{picek2019theory,
|
||
title={When theory meets practice: A framework for robust profiled side-channel analysis},
|
||
author={Picek, Stjepan and Heuser, Annelie and Alippi, Cesare and Regazzoni, Francesco},
|
||
year={2019}
|
||
}
|
||
|
||
|
||
|
||
|
||
@inproceedings{shumov2010side,
|
||
title={Side channel leakage profiling in software},
|
||
author={Shumov, D and Montgomery, Peter L},
|
||
booktitle={COSADE 2010},
|
||
year={2010},
|
||
organization={Citeseer}
|
||
}
|
||
|
||
@inproceedings{blanco2017framework,
|
||
title={A framework for acquiring and analyzing traces from cryptographic devices},
|
||
author={Blanco, Alfonso Blanco and de Fuentes, Jose Mar{\'\i}a and Gonz{\'a}lez-Manzano, Lorena and Encinas, Luis Hern{\'a}ndez and Mu{\~n}oz, Agust{\'\i}n Mart{\'\i}n and Oliva, Jos{\'e} Luis Rodrigo and Garc{\'\i}a, J Ignacio S{\'a}nchez},
|
||
booktitle={International Conference on Security and Privacy in Communication Systems},
|
||
pages={283--300},
|
||
year={2017},
|
||
organization={Springer}
|
||
}
|
||
|
||
@misc{NationalInstrumentsHIL,
|
||
author = {National Instruments},
|
||
title = {{Hardware In The Loop Test System}},
|
||
howpublished = "\url{https://www.ni.com/en-ca/innovations/white-papers/09/hardware-in-the-loop--hil--test-system-architectures.html#section--650933511}"
|
||
}
|
||
|
||
@misc{DSpace,
|
||
author = {DSpace},
|
||
title = {{Hardware In The Loop Test System}},
|
||
howpublished = "\url{https://www.dspace.com/shared/data/pdf/2019/dSPACE-Hardware-in-the-Loop-Systems_Business-field-brochure_01-2019_English.pdf}"
|
||
}
|
||
|
||
@misc{Labview,
|
||
author = {National Instruments},
|
||
title = {{LabVIEW DAQ}},
|
||
howpublished = "\url{https://www.ni.com/academic/students/learn-daq/}"
|
||
}
|
||
|
||
% Impact of human error:
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
@article{patel2011impact,
|
||
title={Impact of outlier removal and normalization approach in modified k-means clustering algorithm},
|
||
author={Patel, Vaishali R and Mehta, Rupa G},
|
||
journal={International Journal of Computer Science Issues (IJCSI)},
|
||
volume={8},
|
||
number={5},
|
||
pages={331},
|
||
year={2011},
|
||
publisher={Citeseer}
|
||
}
|
||
|
||
@inproceedings{kazman1994saam,
|
||
title={SAAM: A method for analyzing the properties of software architectures},
|
||
author={Kazman, Rick and Bass, Len and Abowd, Gregory and Webb, Mike},
|
||
booktitle={Proceedings of 16th International Conference on Software Engineering},
|
||
pages={81--90},
|
||
year={1994},
|
||
organization={IEEE}
|
||
}
|
||
|
||
@inproceedings{msgna2014verifying,
|
||
title={Verifying software integrity in embedded systems: A side channel approach},
|
||
author={Msgna, Mehari and Markantonakis, Konstantinos and Naccache, David and Mayes, Keith},
|
||
booktitle={International Workshop on Constructive Side-Channel Analysis and Secure Design},
|
||
pages={261--280},
|
||
year={2014},
|
||
organization={Springer}
|
||
}
|
||
|
||
@article{hochreiter1997long,
|
||
title={Long short-term memory},
|
||
author={Hochreiter, Sepp and Schmidhuber, J{\"u}rgen},
|
||
journal={Neural computation},
|
||
volume={9},
|
||
number={8},
|
||
pages={1735--1780},
|
||
year={1997},
|
||
publisher={MIT Press}
|
||
}
|
||
|
||
@phdthesis{calvi2019runtime,
|
||
title={Runtime Monitoring of Cyber-Physical Systems Using Data-driven Models},
|
||
author={Calvi, Michele Giovanni},
|
||
year={2019},
|
||
school={University of Illinois at Chicago}
|
||
}
|
||
|
||
@inproceedings{moreno2013non,
|
||
title={Non-intrusive program tracing and debugging of deployed embedded systems through side-channel analysis},
|
||
author={Moreno, Carlos and Fischmeister, Sebastian and Hasan, M Anwar},
|
||
booktitle={Proceedings of the 14th ACM SIGPLAN/SIGBED conference on Languages, compilers and tools for embedded systems},
|
||
pages={77--88},
|
||
year={2013}
|
||
}
|
||
|
||
@inproceedings{quisquater2002automatic,
|
||
title={{Automatic Code Recognition for Smartcards Using a Kohonen Neural Network}},
|
||
author={Quisquater, Jean-Jacques and Samyde, David},
|
||
booktitle={CARDIS},
|
||
volume={2},
|
||
pages={6},
|
||
year={2002}
|
||
}
|
||
|
||
@manual{datacenterbreach,
|
||
title = "Cost of a Data Breach Full Report 2022",
|
||
author = "IBM",
|
||
url = "https://www.ibm.com/downloads/cas/3R8N1DZJ",
|
||
year = "2023-04-26"
|
||
}
|
||
|
||
@article{kur2009improving,
|
||
title={Improving resiliency of {J}ava card code against power analysis},
|
||
author={Kur, Jir{\i} and Smolka, Tobi{\'a}{\v{s}} and Svenda, P},
|
||
journal={Mikulaska kryptobesidka, Sbornik prispevku},
|
||
pages={29--39},
|
||
year={2009}
|
||
}
|
||
@article{paliwal,
|
||
title={A MODIFICATION OVER SAKOE AND CHIBA'S DYNAMIC TIME
|
||
WARPING ALGORITHM FOR ISOLATED WORD RECOGNITION*},
|
||
author={K.K. PALIWAL, Anant AGARWAL and Sarvajit S. SINHA},
|
||
year={1981}
|
||
}
|
||
|
||
@inproceedings{deng2009imagenet,
|
||
title={{Imagenet: A Large-Scale Hierarchical Image Database}},
|
||
author={Deng, Jia and Dong, Wei and Socher, Richard and Li, Li-Jia and Li, Kai and Fei-Fei, Li},
|
||
booktitle={2009 IEEE Conference on Computer Vision and Pattern Recognition},
|
||
pages={248--255},
|
||
year={2009},
|
||
organization={IEEE}
|
||
}
|
||
|
||
@inproceedings{szegedy2017inception,
|
||
title={Inception-v4, inception-resnet and the impact of residual connections on learning},
|
||
author={Szegedy, Christian and Ioffe, Sergey and Vanhoucke, Vincent and Alemi, Alexander A},
|
||
booktitle={Thirty-first AAAI conference on artificial intelligence},
|
||
year={2017}
|
||
}
|
||
|
||
|
||
|
||
@inproceedings{chollet2017xception,
|
||
title={Xception: Deep learning with depthwise separable convolutions},
|
||
author={Chollet, Fran{\c{c}}ois},
|
||
booktitle={Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition},
|
||
pages={1251--1258},
|
||
year={2017}
|
||
}
|
||
|
||
@INPROCEEDINGS{1536928, author={D. {Halford} and J. H. {Shoaf} and A. S. {Risley}}, booktitle={27th Annual Symposium on Frequency Control}, title={Spectral Density Analysis: Frequency Domain Specification and Measurement of Signal Stability}, year={1973}, volume={}, number={}, pages={421-431},}
|
||
|
||
@inproceedings{10.5555/645803.669511,
|
||
author = {Keogh, Eamonn J. and Pazzani, Michael J.},
|
||
title = {Scaling up Dynamic Time Warping to Massive Dataset},
|
||
year = {1999},
|
||
isbn = {3540664904},
|
||
publisher = {Springer-Verlag},
|
||
address = {Berlin, Heidelberg},
|
||
booktitle = {Proceedings of the Third European Conference on Principles of Data Mining and Knowledge Discovery},
|
||
pages = {1–11},
|
||
numpages = {11},
|
||
series = {PKDD ’99}
|
||
}
|
||
|
||
@article{theodoridis2009pattern,
|
||
title={Pattern recognition. 2003},
|
||
author={Theodoridis, Sergios and Koutroumbas, Konstantinos},
|
||
journal={Google Scholar Digital Library},
|
||
year={2009}
|
||
}
|
||
@inproceedings{hutter2013temperature,
|
||
title={The temperature side channel and heating fault attacks},
|
||
author={Hutter, Michael and Schmidt, J{\"o}rn-Marc},
|
||
booktitle={International Conference on Smart Card Research and Advanced Applications},
|
||
pages={219--235},
|
||
year={2013},
|
||
organization={Springer}
|
||
}
|
||
@inproceedings{masti2015thermal,
|
||
title={Thermal covert channels on multi-core platforms},
|
||
author={Masti, Ramya Jayaram and Rai, Devendra and Ranganathan, Aanjhan and M{\"u}ller, Christian and Thiele, Lothar and Capkun, Srdjan},
|
||
booktitle={24th {USENIX} Security Symposium ({USENIX} Security '15)},
|
||
pages={865--880},
|
||
year={2015}
|
||
}
|
||
|
||
@ARTICLE{4766926, author={G. V. {Trunk}}, journal={{IEEE Transactions on Pattern Analysis and Machine Intelligence}}, title={A Problem of Dimensionality: A Simple Example}, year={1979}, volume={PAMI-1}, number={3}, pages={306-307}}
|
||
|
||
@inproceedings{genkin2014rsa,
|
||
title="{RSA} key extraction via low-bandwidth acoustic cryptanalysis",
|
||
author={Genkin, Daniel and Shamir, Adi and Tromer, Eran},
|
||
booktitle={Annual Cryptology Conference},
|
||
pages={444--461},
|
||
year={2014},
|
||
organization={Springer}
|
||
}
|
||
|
||
@INPROCEEDINGS{7130435, author={R. {Daş} and A. {Karabade} and G. {Tuna}}, booktitle={2015 23nd Signal Processing and Communications Applications Conference (SIU)}, title={Common network attack types and defense mechanisms}, year={2015}, volume={}, number={}, pages={2658-2661},}
|
||
|
||
@INPROCEEDINGS{727070,
|
||
author={J. T. {Russell} and M. F. {Jacome}},
|
||
booktitle={Proceedings International Conference on Computer Design. VLSI in Computers and Processors (Cat. No.98CB36273)},
|
||
title={Software power estimation and optimization for high performance, 32-bit embedded processors},
|
||
year={1998},
|
||
volume={},
|
||
number={},
|
||
pages={328-333},}
|
||
|
||
@inproceedings{grisel2022work,
|
||
title={Work-in-Progress: Boot Sequence Integrity Verification with Power Analysis},
|
||
author={Grisel-Davy, Arthur and Bhogayata, Amrita Milan and Pabbi, Srijan and Narayan, Apurva and Fischmeister, Sebastian},
|
||
booktitle={2022 International Conference on Embedded Software (EMSOFT)},
|
||
pages={3--4},
|
||
year={2022},
|
||
organization={IEEE}
|
||
}
|
||
|
||
@article{rohatgi2009electromagnetic,
|
||
title={Electromagnetic attacks and countermeasures},
|
||
author={Rohatgi, Pankaj},
|
||
journal={Cryptographic Engineering},
|
||
pages={407--430},
|
||
year={2009},
|
||
publisher={Springer}
|
||
}
|
||
|
||
|
||
@inproceedings{sun2017revisiting,
|
||
title={Revisiting unreasonable effectiveness of data in deep learning era},
|
||
author={Sun, Chen and Shrivastava, Abhinav and Singh, Saurabh and Gupta, Abhinav},
|
||
booktitle={Proceedings of the IEEE international conference on computer vision},
|
||
pages={843--852},
|
||
year={2017}
|
||
}
|
||
|
||
@inproceedings{Pradyumna_Pothukuchi_2021,
|
||
doi = {10.1109/isca52012.2021.00074},
|
||
url = {https://arxiv.org/abs/1907.09440},
|
||
year = 2021,
|
||
month = {jun},
|
||
publisher = {{IEEE}},
|
||
author = {Raghavendra Pradyumna Pothukuchi and Sweta Yamini Pothukuchi and Petros G. Voulgaris and Alexander Schwing and Josep Torrellas},
|
||
title = {Maya: Using Formal Control to Obfuscate Power Side Channels},
|
||
booktitle = {2021 {ACM}/{IEEE} 48th Annual International Symposium on Computer Architecture ({ISCA})}
|
||
}
|