With an ever-increasing and ever more aggressive proliferation of malware, its detection is of utmost importance. However, due to the fact that IoT devices are resource-constrained, it …
Mobile devices increasingly become the computing platform for networked applications such as Web and email. This development requires strong guarantees on the system integrity and …
Phone touchscreens, and other similar hardware components such as orientation sensors, wireless charging controllers, and NFC readers, are often produced by third-party …
We propose a novel malware detection system for critical embedded and cyber-physical systems (CPS). The system exploits electromagnetic (EM) side-channel signals from the …
Internet of Things (IoT) devices have conquered the modern world, and they are increasingly gaining ground day by day. Together, with their widespread use also interests from attackers …
JG del Arroyo, J Bindewald… - … Conference on Cyber …, 2017 - books.google.com
The Bluetooth Low Energy (BLE) protocol is widely deployed on wireless devices in the consumer market, where applications benefit from its low energy consumption and low …
Concealing malicious components within widely used USB peripherals has become a popular attack vector utilizing social engineering techniques and exploiting users' trust in …
J Patrick-Evans, L Cavallaro, J Kinder - 11th USENIX Workshop on …, 2017 - usenix.org
USB client device drivers are a haven for software bugs, due to the sheer variety of devices and the tendency of maintenance to slip as devices age. At the same time, the high privilege …