Homonit: Monitoring smart home apps from encrypted traffic
Smart home is an emerging technology for intelligently connecting a large variety of smart
sensors and devices to facilitate automation of home appliances, lighting, heating and …
sensors and devices to facilitate automation of home appliances, lighting, heating and …
I know what you see: Power side-channel attack on convolutional neural network accelerators
Deep learning has become the de-facto computational paradigm for various kinds of
perception problems, including many privacy-sensitive applications such as online medical …
perception problems, including many privacy-sensitive applications such as online medical …
Screaming channels: When electromagnetic side channels meet radio transceivers
This paper presents a new side channel that affects mixed-signal chips used in widespread
wireless communication protocols, such as Bluetooth and WiFi. This increasingly common …
wireless communication protocols, such as Bluetooth and WiFi. This increasingly common …
[HTML][HTML] Energy-based approach for attack detection in IoT devices: A survey
V Merlino, D Allegra - Internet of Things, 2024 - Elsevier
The proliferation of Internet of Things (IoT) devices has revolutionized multiple sectors,
promising significant societal benefits. With an estimated 29 billion IoT devices expected to …
promising significant societal benefits. With an estimated 29 billion IoT devices expected to …
Watch me, but don't touch me! contactless control flow monitoring via electromagnetic emanations
Trustworthy operation of industrial control systems depends on secure and real-time code
execution on the embedded programmable logic controllers (PLCs). The controllers monitor …
execution on the embedded programmable logic controllers (PLCs). The controllers monitor …
DeepPower: Non-intrusive and deep learning-based detection of IoT malware using power side channels
The vulnerability of Internet of Things (IoT) devices to malware attacks poses huge
challenges to current Internet security. The IoT malware attacks are usually composed of …
challenges to current Internet security. The IoT malware attacks are usually composed of …
Malware detection in embedded systems using neural network model for electromagnetic side-channel signals
We propose a novel malware detection system for critical embedded and cyber-physical
systems (CPS). The system exploits electromagnetic (EM) side-channel signals from the …
systems (CPS). The system exploits electromagnetic (EM) side-channel signals from the …
IDEA: Intrusion detection through electromagnetic-signal analysis for critical embedded and cyber-physical systems
We propose a novel framework called IDEA that exploits electromagnetic (EM) side-channel
signals to detect malicious activity on embedded and cyber-physical systems (CPS). IDEA …
signals to detect malicious activity on embedded and cyber-physical systems (CPS). IDEA …
Miracle: Micro-architectural leakage evaluation
In this paper, we describe an extensible experimental infrastructure and methodology for
evaluating the micro-architectural leakage, based on power consumption, which stems from …
evaluating the micro-architectural leakage, based on power consumption, which stems from …
REMOTE: Robust external malware detection framework by using electromagnetic signals
Cyber-physical systems (CPS) are controlling many critical and sensitive aspects of our
physical world while being continuously exposed to potential cyber-attacks. These systems …
physical world while being continuously exposed to potential cyber-attacks. These systems …