Edge computing security: State of the art and challenges

Y Xiao, Y Jia, C Liu, X Cheng, J Yu… - Proceedings of the …, 2019 - ieeexplore.ieee.org
The rapid developments of the Internet of Things (IoT) and smart mobile devices in recent
years have been dramatically incentivizing the advancement of edge computing. On the one …

A taxonomy of cyber-physical threats and impact in the smart home

R Heartfield, G Loukas, S Budimir, A Bezemskij… - Computers & …, 2018 - Elsevier
In the past, home automation was a small market for technology enthusiasts.
Interconnectivity between devices was down to the owner's technical skills and creativity …

Skypemorph: Protocol obfuscation for tor bridges

H Mohajeri Moghaddam, B Li, M Derakhshani… - Proceedings of the …, 2012 - dl.acm.org
The Tor network is designed to provide users with low-latency anonymous communications.
Tor clients build circuits with publicly listed relays to anonymously reach their destinations …

Multimedia content identification through smart meter power usage profiles

U Greveler, P Glösekötterz, B Justusy… - Proceedings of the …, 2012 - search.proquest.com
Advanced metering devices (smart meters) are being installed throughout electric networks
in Germany (as well as in other parts of Europe and in the United States). Unfortunately …

{WattsUpDoc}: Power side channels to nonintrusively discover untargeted malware on embedded medical devices

SS Clark, B Ransford, A Rahmati, S Guineau… - … USENIX Workshop on …, 2013 - usenix.org
Medical devices based on embedded systems are ubiquitous in clinical settings.
Increasingly, they connect to networks and run off-the-shelf operating systems vulnerable to …

Synesthesia: Detecting screen content via remote acoustic side channels

D Genkin, M Pattani, R Schuster… - 2019 IEEE Symposium …, 2019 - ieeexplore.ieee.org
We show that subtle acoustic noises emanating from within computer screens can be used
to detect the content displayed on the screens. This sound can be picked up by ordinary …

Compromising emanations of LCD TV sets

MG Kuhn - IEEE Transactions on Electromagnetic Compatibility, 2013 - ieeexplore.ieee.org
This study attempts to characterize the radiated compromising emanations from four typical
television sets with liquid-crystal display (LCD), in particular the predictability of format and …

[PDF][PDF] Security of distributed intelligence in edge computing: Threats and countermeasures

MS Ansari, SH Alsamhi, Y Qiao, Y Ye… - The Cloud-to-Thing …, 2020 - library.oapen.org
Rapid growth in the amount of data produced by IoT sensors and devices has led to the
advent of edge computing wherein the data is processed at a point at or near to its origin …

[PDF][PDF] Sok: Privacy technologies for smart grids–a survey of options

M Jawurek, F Kerschbaum, G Danezis - Microsoft Res., Cambridge …, 2012 - microsoft.com
We present the problems associated with protecting privacy in smart grids and survey
currently proposed solutions. First we discuss use-cases, the policy environment and the …

Android {SmartTVs} vulnerability discovery via {log-guided} fuzzing

Y Aafer, W You, Y Sun, Y Shi, X Zhang… - 30th USENIX Security …, 2021 - usenix.org
The recent rise of Smart IoT devices has opened new doors for cyber criminals to achieve
damages unique to the ecosystem. SmartTVs, the most widely adopted home-based IoT …