Lora networking techniques for large-scale and long-term iot: A down-to-top survey
Low-Power Wide-Area Networks (LPWANs) are an emerging Internet-of-Things (IoT)
paradigm, which caters to large-scale and long-term sensory data collection demand …
paradigm, which caters to large-scale and long-term sensory data collection demand …
Recent advances in LoRa: A comprehensive survey
The vast demand for diverse applications raises new networking challenges, which have
encouraged the development of a new paradigm of Internet of Things (IoT), eg, LoRa. LoRa …
encouraged the development of a new paradigm of Internet of Things (IoT), eg, LoRa. LoRa …
" Get in Researchers; We're Measuring Reproducibility": A Reproducibility Study of Machine Learning Papers in Tier 1 Security Conferences
Reproducibility is crucial to the advancement of science; it strengthens confidence in
seemingly contradictory results and expands the boundaries of known discoveries …
seemingly contradictory results and expands the boundaries of known discoveries …
Camradar: Hidden camera detection leveraging amplitude-modulated sensor images embedded in electromagnetic emanations
Hidden cameras in sensitive locations have become an increasing threat to personal privacy
all over the world. Because the camera is small and camouflaged, it is difficult to detect the …
all over the world. Because the camera is small and camouflaged, it is difficult to detect the …
Covert channel communication as an emerging security threat in 2.5 d/3d integrated systems
In this paper, first, a broad overview of existing covert channel communication-based
security attacks is provided. Such covert channels establish a communication link between …
security attacks is provided. Such covert channels establish a communication link between …
Graphics pee** unit: Exploiting em side-channel information of gpus to eavesdrop on your neighbors
As the popularity of graphics processing units (GPUs) grows rapidly in recent years, it
becomes very critical to study and understand the security implications imposed by them. In …
becomes very critical to study and understand the security implications imposed by them. In …
Air-fi: Leaking data from air-gapped computers using wi-fi frequencies
M Guri - IEEE Transactions on Dependable and Secure …, 2022 - ieeexplore.ieee.org
This article presents a new attack allowing attackers to exfiltrate data from isolated, air-
gapped computers via Wi-Fi frequencies. We show that malware in a compromised air …
gapped computers via Wi-Fi frequencies. We show that malware in a compromised air …
POWER-SUPPLaY: Leaking Sensitive Data From Air-Gapped, Audio-Gapped Systems by Turning the Power Supplies into Speakers
M Guri - IEEE Transactions on Dependable and Secure …, 2021 - ieeexplore.ieee.org
In this article, we introduce a new covert channel that enables attackers to leak data
acoustically from highly secured, air-gapped and audio-gapped systems. The proposed …
acoustically from highly secured, air-gapped and audio-gapped systems. The proposed …
Air-gap electromagnetic covert channel
M Guri - IEEE Transactions on Dependable and Secure …, 2023 - ieeexplore.ieee.org
Air-gapped systems are isolated from the Internet due to the sensitive information they
handle. This paper introduces a covert channel attack that leaks sensitive information over …
handle. This paper introduces a covert channel attack that leaks sensitive information over …
FLoRa: Energy-efficient, reliable, and beamforming-assisted over-the-air firmware update in LoRa networks
LoRa has emerged as one of the promising long-range and low-power wireless
communication technologies for Internet of Things (IoT). With the massive deployment of …
communication technologies for Internet of Things (IoT). With the massive deployment of …