Edge computing security: State of the art and challenges

Y Xiao, Y Jia, C Liu, X Cheng, J Yu… - Proceedings of the …, 2019 - ieeexplore.ieee.org
The rapid developments of the Internet of Things (IoT) and smart mobile devices in recent
years have been dramatically incentivizing the advancement of edge computing. On the one …

Cyber-security threats and side-channel attacks for digital agriculture

AN Alahmadi, SU Rehman, HS Alhazmi, DG Glynn… - Sensors, 2022 - mdpi.com
The invention of smart low-power devices and ubiquitous Internet connectivity have
facilitated the shift of many labour-intensive jobs into the digital domain. The shortage of …

Houdini's escape: Breaking the resource rein of linux control groups

X Gao, Z Gu, Z Li, H Jamjoom, C Wang - Proceedings of the 2019 ACM …, 2019 - dl.acm.org
Linux Control Groups, ie, cgroups, are the key building blocks to enable operating-system-
level containerization. The cgroups mechanism partitions processes into hierarchical groups …

Capspeaker: Injecting voices to microphones via capacitors

X Ji, J Zhang, S Jiang, J Li, W Xu - Proceedings of the 2021 ACM …, 2021 - dl.acm.org
Voice assistants can be manipulated by various malicious voice commands, yet existing
attacks require a nearby speaker to play the attack commands. In this paper, we show that …

C3APSULe: Cross-FPGA Covert-Channel Attacks through Power Supply Unit Leakage

I Giechaskiel, KB Rasmussen… - 2020 IEEE Symposium …, 2020 - ieeexplore.ieee.org
Field-Programmable Gate Arrays (FPGAs) are versatile, reconfigurable integrated circuits
that can be used as hardware accelerators to process highly-sensitive data. Leaking this …

Fingerprinting cloud FPGA infrastructures

S Tian, W Xiong, I Giechaskiel, K Rasmussen… - Proceedings of the …, 2020 - dl.acm.org
In recent years, multiple public cloud FPGA providers have emerged, increasing interest in
FPGA acceleration of cryptographic, bioinformatic, financial, and machine learning …

Alita: Comprehensive performance isolation through bias resource management for public clouds

Q Chen, S Xue, S Zhao, S Chen, Y Wu… - … Conference for High …, 2020 - ieeexplore.ieee.org
The tenants of public cloud platforms share hard-ware resources on the same node,
resulting in the potential for performance interference (or malicious attacks). A tenant is able …

Ohm's law in data centers: A voltage side channel for timing power attacks

MA Islam, S Ren - Proceedings of the 2018 ACM SIGSAC Conference on …, 2018 - dl.acm.org
Maliciously-injected power load, aka power attack, has recently surfaced as a new
egregious attack vector for dangerously compromising the data center availability. This …

Attacks on smart grid: Power supply interruption and malicious power generation

S Adepu, NK Kandasamy, J Zhou, A Mathur - International Journal of …, 2020 - Springer
Electric power supply is an essential component for several sectors including manufacturing,
healthcare, building management, water distribution, and transportation systems. Hence …

[PDF][PDF] Reduced Cooling Redundancy: A New Security Vulnerability in a Hot Data Center.

X Gao, Z Xu, H Wang, L Li, X Wang - NDSS, 2018 - xgao-work.github.io
Data centers have been growing rapidly in recent years to meet the surging demand of
cloud services. However, the expanding scale and powerful servers generate a great …