486 lines
17 KiB
BibTeX
486 lines
17 KiB
BibTeX
@online{cve-firmware,
|
||
author = {mitre.org},
|
||
title = {cve.mitre.org},
|
||
year = 2021,
|
||
url = {https://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=Firmware},
|
||
urldate = {2021-12-7}
|
||
}
|
||
|
||
@article{BASNIGHT201376,
|
||
title = {Firmware modification attacks on programmable logic controllers},
|
||
journal = {International Journal of Critical Infrastructure Protection},
|
||
volume = {6},
|
||
number = {2},
|
||
pages = {76-84},
|
||
year = {2013},
|
||
issn = {1874-5482},
|
||
doi = {https://doi.org/10.1016/j.ijcip.2013.04.004},
|
||
url = {https://www.sciencedirect.com/science/article/pii/S1874548213000231},
|
||
author = {Zachry Basnight and Jonathan Butts and Juan Lopez and Thomas Dube},
|
||
}
|
||
|
||
@misc{rieck2016attacks,
|
||
title={Attacks on Fitness Trackers Revisited: A Case-Study of Unfit Firmware Security},
|
||
author={Jakob Rieck},
|
||
year={2016},
|
||
eprint={1604.03313},
|
||
archivePrefix={arXiv},
|
||
primaryClass={cs.CR}
|
||
}
|
||
|
||
@inproceedings {185175,
|
||
author = {Jacob Maskiewicz and Benjamin Ellis and James Mouradian and Hovav Shacham},
|
||
title = {Mouse Trap: Exploiting Firmware Updates in {USB} Peripherals},
|
||
booktitle = {8th {USENIX} Workshop on Offensive Technologies ({WOOT} 14)},
|
||
year = {2014},
|
||
address = {San Diego, CA},
|
||
url = {https://www.usenix.org/conference/woot14/workshop-program/presentation/maskiewicz},
|
||
publisher = {{USENIX} Association},
|
||
month = aug,
|
||
}
|
||
|
||
@online{usb_killer,
|
||
author = {Dark Purple },
|
||
title = {USB Killer},
|
||
year = 2021,
|
||
url = {https://kukuruku.co/post/usb-killer/},
|
||
urldate = {2021-12-18}
|
||
}
|
||
|
||
@online{lan_turtle,
|
||
author = {Hack5},
|
||
title = {LAN Turtle},
|
||
year = 2021,
|
||
url = {https://hak5.org/collections/sale/products/lan-turtle},
|
||
urldate = {2021-12-18}
|
||
}
|
||
|
||
@online{rubber_ducky,
|
||
author = {Hack5},
|
||
title = {Rubber Ducky},
|
||
year = 2021,
|
||
url = {https://hak5.org/collections/sale/products/usb-rubber-ducky-deluxe},
|
||
urldate = {2021-12-18}
|
||
}
|
||
|
||
@online{key_croc,
|
||
author = {Hack5},
|
||
title = {Key Coc},
|
||
year = 2021,
|
||
url = {https://hak5.org/collections/sale/products/key-croc},
|
||
urldate = {2021-12-18}
|
||
}
|
||
|
||
@online{minio,
|
||
author = {MinIO},
|
||
title = {MinIO},
|
||
year = 2021,
|
||
url = {https://min.io/},
|
||
urldate = {2021-12-18}
|
||
}
|
||
|
||
@INPROCEEDINGS{firmware_blockchain,
|
||
author={Lim, Jea-Min and Kim, Youngpil and Yoo, Chuck},
|
||
booktitle={2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData)},
|
||
title={Chain Veri: Blockchain-Based Firmware Verification System for IoT Environment},
|
||
year={2018},
|
||
volume={},
|
||
number={},
|
||
pages={1050-1056},
|
||
doi={10.1109/Cybermatics_2018.2018.00194}
|
||
}
|
||
|
||
@InProceedings{firmware_blockchain_2,
|
||
author={Lee, Boohyung and Malik, Sehrish and Wi, Sarang and Lee, Jong-Hyouk},
|
||
editor="Lee, Jong-Hyouk
|
||
and Pack, Sangheon",
|
||
title="Firmware Verification of Embedded Devices Based on a Blockchain",
|
||
booktitle="Quality, Reliability, Security and Robustness in Heterogeneous Networks",
|
||
year="2017",
|
||
publisher="Springer International Publishing",
|
||
address="Cham",
|
||
pages="52--61",
|
||
isbn="978-3-319-60717-7"
|
||
}
|
||
|
||
@InProceedings{firmware_data,
|
||
author={McMinn, Lucille and Butts, Jonathan},
|
||
editor="Butts, Jonathan
|
||
and Shenoi, Sujeet",
|
||
title="A Firmware Verification Tool for Programmable Logic Controllers",
|
||
booktitle="Critical Infrastructure Protection VI",
|
||
year="2012",
|
||
publisher="Springer Berlin Heidelberg",
|
||
address="Berlin, Heidelberg",
|
||
pages="59--69",
|
||
isbn="978-3-642-35764-0"
|
||
}
|
||
|
||
@INPROCEEDINGS{firmware_crypto,
|
||
author={Nilsson, Dennis K. and Sun, Lei and Nakajima, Tatsuo},
|
||
booktitle={2008 IEEE Globecom Workshops},
|
||
title={A Framework for Self-Verification of Firmware Updates over the Air in Vehicle ECUs},
|
||
year={2008},
|
||
volume={},
|
||
number={},
|
||
pages={1-5},
|
||
doi={10.1109/GLOCOMW.2008.ECP.56}
|
||
}
|
||
|
||
@InProceedings{firmware_sign,
|
||
author={Jeong, Eunseon and Park, Junyoung and Son, Byeonggeun and Kim, Myoungsu and Yim, Kangbin},
|
||
editor={Barolli, Leonard and Xhafa, Fatos and Javaid, Nadeem and Enokido, Tomoya},
|
||
title={Study on Signature Verification Process for the Firmware of an Android Platform},
|
||
booktitle="Innovative Mobile and Internet Services in Ubiquitous Computing",
|
||
year="2019",
|
||
publisher="Springer International Publishing",
|
||
address="Cham",
|
||
pages="540--545",
|
||
isbn="978-3-319-93554-6"
|
||
}
|
||
|
||
@misc{mitre,
|
||
title = {MITRE ATT&CK® T1542.001 Pre-OS Boot: System Firmware},
|
||
howpublished = {https://attack.mitre.org/versions/v10/techniques/T1542/001/},
|
||
note = {Accessed: 2022-03-31}
|
||
}
|
||
|
||
@misc{capec,
|
||
title = {CAPEC-532: Altered Installed BIOS},
|
||
howpublished = {https://capec.mitre.org/data/definitions/532.html},
|
||
note = {Accessed: 2022-03-31}
|
||
}
|
||
|
||
@misc{coreboot,
|
||
title = {Coreboot. Fast, secure and flexible OpenSource firmware},
|
||
howpublished = {https://www.coreboot.org/},
|
||
note = {Accessed: 2022-03-31}
|
||
}
|
||
|
||
@misc{owrt,
|
||
title = {OpenWrt},
|
||
howpublished = {https://openwrt.org/},
|
||
note = {Accessed: 2022-03-31}
|
||
}
|
||
|
||
@misc{ddwrt,
|
||
title = {DD-WRT},
|
||
howpublished = {https://dd-wrt.com/},
|
||
note = {Accessed: 2022-03-31}
|
||
}
|
||
|
||
@misc{freshtomato,
|
||
title = {FreshTomato},
|
||
howpublished = {https://www.freshtomato.org/},
|
||
note = {Accessed: 2022-03-31}
|
||
}
|
||
|
||
@misc{droneincrease,
|
||
title= {Futur of Drone Industry},
|
||
howpublished ={https://www.strategicmarketresearch.com/blogs/drone-industry-future},
|
||
note={accessed: 2023-06}
|
||
}
|
||
|
||
@misc{trustanchor,
|
||
title = {Cisco's Trustworthy Technology Datasheet},
|
||
howpublished = {https://www.cisco.com/c/dam/en_us/about/doing_business/trust-center/docs/trustworthy-technologies-datasheet.pdf},
|
||
note = {Accessed: 2022-04-06}
|
||
}
|
||
|
||
@misc{downtime,
|
||
title = {How to Calculate Data Center Downtime},
|
||
howpublished = {https://datacenterfrontier.com/how-calculate-data-center-downtime/},
|
||
note = {Accessed: 2022-04-06}
|
||
}
|
||
|
||
|
||
@misc{cryptoreview,
|
||
author = {YongBin Zhou and DengGuo Feng},
|
||
title = {Side-Channel Attacks: Ten Years After Its Publication and the Impacts on Cryptographic Module Security Testing},
|
||
howpublished = {Cryptology ePrint Archive, Report 2005/388},
|
||
year = {2005},
|
||
note = {https://ia.cr/2005/388},
|
||
}
|
||
|
||
@misc{curveattack,
|
||
author = {Roberto M. Avanzi},
|
||
title = {Side Channel Attacks on Implementations of Curve-Based Cryptographic Primitives},
|
||
howpublished = {Cryptology ePrint Archive, Report 2005/017},
|
||
year = {2005},
|
||
note = {https://ia.cr/2005/017},
|
||
}
|
||
|
||
@InProceedings{keyboard,
|
||
author={Anand, S. Abhishek and Saxena, Nitesh},
|
||
editor="Grossklags, Jens
|
||
and Preneel, Bart",
|
||
title="A Sound for a Sound: Mitigating Acoustic Side Channel Attacks on Password Keystrokes with Active Sounds",
|
||
booktitle="Financial Cryptography and Data Security",
|
||
year="2017",
|
||
publisher="Springer Berlin Heidelberg",
|
||
address="Berlin, Heidelberg",
|
||
pages="346--364",
|
||
}
|
||
|
||
@INPROCEEDINGS{printer,
|
||
author={Al Faruque, Mohammad Abdullah and Chhetri, Sujit Rokka and Canedo, Arquimedes and Wan, Jiang},
|
||
booktitle={2016 ACM/IEEE 7th International Conference on Cyber-Physical Systems (ICCPS)},
|
||
title={Acoustic Side-Channel Attacks on Additive Manufacturing Systems},
|
||
year={2016},
|
||
volume={},
|
||
number={},
|
||
pages={1-10},
|
||
doi={10.1109/ICCPS.2016.7479068}
|
||
}
|
||
|
||
@inproceedings{iot_anoamly_sca,
|
||
author = {Devin Spatz and Devin Smarra and Igor Ternovskiy},
|
||
title = {{A review of anomaly detection techniques leveraging side-channel emissions}},
|
||
volume = {11011},
|
||
booktitle = {Cyber Sensing 2019},
|
||
editor = {Igor V. Ternovskiy and Peter Chin},
|
||
organization = {International Society for Optics and Photonics},
|
||
publisher = {SPIE},
|
||
pages = {48 -- 55},
|
||
keywords = {Rf emission, loT, Cyber security},
|
||
year = {2019},
|
||
doi = {10.1117/12.2521450},
|
||
URL = {https://doi.org/10.1117/12.2521450}
|
||
}
|
||
|
||
@INPROCEEDINGS{power-devices,
|
||
author={Konstantinou, Charalambos and Maniatakos, Michail},
|
||
booktitle={2015 IEEE International Conference on Smart Grid Communications (SmartGridComm)},
|
||
title={Impact of firmware modification attacks on power systems field devices},
|
||
year={2015},
|
||
volume={},
|
||
number={},
|
||
pages={283-288},
|
||
doi={10.1109/SmartGridComm.2015.7436314}
|
||
}
|
||
|
||
@article{plc_firmware,
|
||
title = {Firmware modification attacks on programmable logic controllers},
|
||
journal = {International Journal of Critical Infrastructure Protection},
|
||
volume = {6},
|
||
number = {2},
|
||
pages = {76-84},
|
||
year = {2013},
|
||
issn = {1874-5482},
|
||
doi = {https://doi.org/10.1016/j.ijcip.2013.04.004},
|
||
url = {https://www.sciencedirect.com/science/article/pii/S1874548213000231},
|
||
author = {Zachry Basnight and Jonathan Butts and Juan Lopez and Thomas Dube},
|
||
keywords = {Industrial control systems, Programmable logic controllers, Firmware, Modification attacks, Reverse engineering},
|
||
}
|
||
|
||
@article{santamarta2012here,
|
||
title={Here be backdoors: A journey into the secrets of industrial firmware},
|
||
author={Santamarta, Ruben},
|
||
journal={Black Hat USA},
|
||
year={2012}
|
||
}
|
||
|
||
@ARTICLE{health_review, author={Yaqoob, Tahreem and Abbas, Haider and Atiquzzaman, Mohammed}, journal={IEEE Communications Surveys Tutorials}, title={Security Vulnerabilities, Attacks, Countermeasures, and Regulations of Networked Medical Devices—A Review}, year={2019}, volume={21}, number={4}, pages={3723-3768}, doi={10.1109/COMST.2019.2914094}}
|
||
|
||
@article{pacemaker,
|
||
author = {Adrian Baranchuk and Bryce Alexander and Debra Campbell and Sohaib Haseeb and Damian Redfearn and Chris Simpson and Ben Glover },
|
||
title = {Pacemaker Cybersecurity},
|
||
journal = {Circulation},
|
||
volume = {138},
|
||
number = {12},
|
||
pages = {1272-1273},
|
||
year = {2018},
|
||
doi = {10.1161/CIRCULATIONAHA.118.035261},
|
||
URL = {https://www.ahajournals.org/doi/abs/10.1161/CIRCULATIONAHA.118.035261},
|
||
eprint = {https://www.ahajournals.org/doi/pdf/10.1161/CIRCULATIONAHA.118.035261}
|
||
}
|
||
|
||
@article{medical_case_study,
|
||
author = {Ang Cui, Michael Costello and Salvatore J. Stolfo},
|
||
title = {When Firmware Modifications Attack: A Case Study of Embedded Exploitation},
|
||
journal = {20th Annual Network & Distributed System Security Symposium 2013},
|
||
year = {2013},
|
||
}
|
||
|
||
@InProceedings{railway,
|
||
author={B{\"a}ckman, Ronny and Oliver, Ian and Limonta, Gabriela},
|
||
editor="Casimiro, Ant{\'o}nio
|
||
and Ortmeier, Frank
|
||
and Schoitsch, Erwin
|
||
and Bitsch, Friedemann
|
||
and Ferreira, Pedro",
|
||
title="Integrity Checking of Railway Interlocking Firmware",
|
||
booktitle="Computer Safety, Reliability, and Security. SAFECOMP 2020 Workshops",year="2020",
|
||
publisher="Springer International Publishing",
|
||
address="Cham",
|
||
pages="161--175",}
|
||
|
||
|
||
@INPROCEEDINGS{cars, author={Nilsson, Dennis K. and Phung, Phu H. and Larson, Ulf E.}, booktitle={IET Road Transport Information and Control - RTIC 2008 and ITS United Kingdom Members' Conference}, title={Vehicle ECU classification based on safety-security characteristics}, year={2008}, volume={}, number={}, pages={1-7}, doi={10.1049/ic.2008.0810}}
|
||
|
||
|
||
@article{BASNIGHT201377,
|
||
title = {Firmware modification attacks on programmable logic controllers},
|
||
journal = {International Journal of Critical Infrastructure Protection},
|
||
volume = {6},
|
||
number = {2},
|
||
pages = {76-84},
|
||
year = {2013},
|
||
issn = {1874-5482},
|
||
doi = {https://doi.org/10.1016/j.ijcip.2013.04.004},
|
||
url = {https://www.sciencedirect.com/science/article/pii/S1874548213000231},
|
||
author = {Zachry Basnight and Jonathan Butts and Juan Lopez and Thomas Dube},
|
||
keywords = {Industrial control systems, Programmable logic controllers, Firmware, Modification attacks, Reverse engineering}
|
||
}
|
||
|
||
@INPROCEEDINGS{9065145, author={Gao, Chao and Luo, Lan and Zhang, Yue and Pearson, Bryan and Fu, Xinwen}, booktitle={2019 IEEE International Conference on Industrial Internet (ICII)}, title={Microcontroller Based IoT System Firmware Security: Case Studies}, year={2019}, volume={}, number={}, pages={200-209}, doi={10.1109/ICII.2019.00045}}
|
||
|
||
@article{thrangrycats,
|
||
title={Thrangrycat flaw lets attackers plant persistent backdoors on Cisco gear},
|
||
author={Cimpanu, C},
|
||
journal={Accessed: Sep},
|
||
volume={15},
|
||
pages={2019},
|
||
year={2019}
|
||
}
|
||
|
||
@article{hidden,
|
||
title={Source Hidden for Double Blind Review},
|
||
author={Jhon Doe},
|
||
journal = {Journal},
|
||
year = {2022},
|
||
}
|
||
|
||
@INPROCEEDINGS{blockchain1,
|
||
author={Dhakal, Samip and Jaafar, Fehmi and Zavarsky, Pavol},
|
||
booktitle={2019 IEEE 19th International Symposium on High Assurance Systems Engineering (HASE)},
|
||
title={Private Blockchain Network for IoT Device Firmware Integrity Verification and Update},
|
||
year={2019},
|
||
volume={},
|
||
number={},
|
||
pages={164-170},
|
||
doi={10.1109/HASE.2019.00033}
|
||
}
|
||
|
||
@inproceedings{sca_attack,
|
||
author = {Liu, Yannan and Wei, Lingxiao and Zhou, Zhe and Zhang, Kehuan and Xu, Wenyuan and Xu, Qiang},
|
||
title = {On Code Execution Tracking via Power Side-Channel},
|
||
year = {2016},
|
||
isbn = {9781450341394},
|
||
publisher = {Association for Computing Machinery},
|
||
address = {New York, NY, USA},
|
||
url = {https://doi.org/10.1145/2976749.2978299},
|
||
doi = {10.1145/2976749.2978299},
|
||
booktitle = {Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security},
|
||
pages = {1019–1031},
|
||
numpages = {13},
|
||
keywords = {code execution tracking, power side-channel, embedded system, hardware security},
|
||
location = {Vienna, Austria},
|
||
series = {CCS '16}
|
||
}
|
||
|
||
@INPROCEEDINGS{7928948, author={Krishnankutty, Deepak and Robucci, Ryan and Banerjee, Nilanjan and Patel, Chintan}, booktitle={2017 IEEE 35th VLSI Test Symposium (VTS)}, title={Fiscal: Firmware identification using side-channel power analysis}, year={2017}, volume={}, number={}, pages={1-6}, doi={10.1109/VTS.2017.7928948}}
|
||
|
||
@inproceedings{ssd_firmware,
|
||
author = {Brown, Dane and Walker, Owens and Rakvic, Ryan and Ives, Robert W. and Ngo, Hau and Shey, James and Blanco, Justin},
|
||
title = {Towards Detection of Modified Firmware on Solid State Drives via Side Channel Analysis},
|
||
year = {2018},
|
||
isbn = {9781450364751},
|
||
publisher = {Association for Computing Machinery},
|
||
address = {New York, NY, USA},
|
||
url = {https://doi.org/10.1145/3240302.3285860},
|
||
doi = {10.1145/3240302.3285860},
|
||
booktitle = {Proceedings of the International Symposium on Memory Systems},
|
||
pages = {315–320},
|
||
numpages = {6},
|
||
keywords = {firmware, security, classification, embedded systems},
|
||
location = {Alexandria, Virginia, USA},
|
||
series = {MEMSYS '18}
|
||
}
|
||
|
||
@article{timing,
|
||
title = {Using timing-based side channels for anomaly detection in industrial control systems},
|
||
journal = {International Journal of Critical Infrastructure Protection},
|
||
volume = {15},
|
||
pages = {12-26},
|
||
year = {2016},
|
||
issn = {1874-5482},
|
||
doi = {https://doi.org/10.1016/j.ijcip.2016.07.003},
|
||
url = {https://www.sciencedirect.com/science/article/pii/S1874548216301111},
|
||
author = {Stephen Dunlap and Jonathan Butts and Juan Lopez and Mason Rice and Barry Mullins},
|
||
}
|
||
|
||
@INPROCEEDINGS{DTU, author={Xu, Aidong and Jiang, Yixin and Cao, Yang and Zhang, Guoming and Ji, Xiaoyu and Xu, Wenyuan}, booktitle={2019 IEEE 3rd Conference on Energy Internet and Energy System Integration (EI2)}, title={ADDP: Anomaly Detection for DTU Based on Power Consumption Side-Channel}, year={2019}, volume={}, number={}, pages={2659-2663}, doi={10.1109/EI247390.2019.9062014}}
|
||
|
||
@inproceedings {wud,
|
||
author = {Shane S. Clark and Benjamin Ransford and Amir Rahmati and Shane Guineau and Jacob Sorber and Wenyuan Xu and Kevin Fu},
|
||
title = {{WattsUpDoc}: Power Side Channels to Nonintrusively Discover Untargeted Malware on Embedded Medical Devices},
|
||
booktitle = {2013 USENIX Workshop on Health Information Technologies (HealthTech 13)},
|
||
year = {2013},
|
||
address = {Washington, D.C.},
|
||
url = {https://www.usenix.org/conference/healthtech13/workshop-program/presentation/clark},
|
||
publisher = {USENIX Association},
|
||
month = aug,
|
||
}
|
||
|
||
@dataset{dataset,
|
||
author = {Anonymous},
|
||
title = {Dataset of bootup power consumption traces for four networking equipments.},
|
||
month = apr,
|
||
year = 2022,
|
||
publisher = {Zenodo},
|
||
doi = {10.5281/zenodo.6419214},
|
||
url = {https://doi.org/10.5281/zenodo.6419214}
|
||
}
|
||
|
||
@book{han2011data,
|
||
title={Data mining: concepts and techniques},
|
||
author={Han, Jiawei and Pei, Jian and Kamber, Micheline},
|
||
year={2011},
|
||
publisher={Elsevier}
|
||
}
|
||
|
||
@article{zimmering2021generating,
|
||
title={Generating Artificial Sensor Data for the Comparison of Unsupervised Machine Learning Methods},
|
||
author={Zimmering, Bernd and Niggemann, Oliver and Hasterok, Constanze and Pfannstiel, Erik and Ramming, Dario and Pfrommer, Julius},
|
||
journal={Sensors},
|
||
volume={21},
|
||
number={7},
|
||
pages={2397},
|
||
year={2021},
|
||
publisher={Multidisciplinary Digital Publishing Institute}
|
||
}
|
||
|
||
@INPROCEEDINGS{8326960,
|
||
author={Dey, Vishal and Pudi, Vikramkumar and Chattopadhyay, Anupam and Elovici, Yuval},
|
||
booktitle={2018 31st International Conference on VLSI Design and 2018 17th International Conference on Embedded Systems (VLSID)},
|
||
title={Security Vulnerabilities of Unmanned Aerial Vehicles and Countermeasures: An Experimental Study},
|
||
year={2018},
|
||
volume={},
|
||
number={},
|
||
pages={398-403},
|
||
doi={10.1109/VLSID.2018.97}
|
||
}
|
||
|
||
@INPROCEEDINGS{8433205,
|
||
author={Chen, Wenxin and Dong, Yingfei and Duan, Zhenhai},
|
||
booktitle={2018 IEEE Conference on Communications and Network Security (CNS)},
|
||
title={Manipulating Drone Dynamic State Estimation to Compromise Navigation},
|
||
year={2018},
|
||
volume={},
|
||
number={},
|
||
pages={1-9},
|
||
doi={10.1109/CNS.2018.8433205}
|
||
}
|
||
|
||
@ARTICLE{8556480,
|
||
author={Bisio, Igor and Garibotto, Chiara and Lavagetto, Fabio and Sciarrone, Andrea and Zappatore, Sandro},
|
||
journal={IEEE Transactions on Vehicular Technology},
|
||
title={Blind Detection: Advanced Techniques for WiFi-Based Drone Surveillance},
|
||
year={2019},
|
||
volume={68},
|
||
number={1},
|
||
pages={938-946},
|
||
doi={10.1109/TVT.2018.2884767}
|
||
}
|
||
|