Edge security: Challenges and issues

X Jin, C Katsis, F Sang, J Sun, A Kundu… - arXiv preprint arXiv …, 2022 - arxiv.org
Edge computing is a paradigm that shifts data processing services to the network edge,
where data are generated. While such an architecture provides faster processing and …

A Review on Network Covert Channel Construction and Attack Detection

MA Khadse, DM Dakhane - Concurrency and Computation …, 2024 - Wiley Online Library
ABSTRACT A covert network channel is a communication channel in which the message is
secretly transmitted to the recipient. Sometimes, covert network channels are vulnerable to …

[PDF][PDF] Covert channel attack to federated learning systems

G Costa, F Pinelli, S Soderi, G Tolomei - arXiv preprint arXiv …, 2021 - academia.edu
Federated learning (FL) goes beyond traditional, centralized machine learning by
distributing model training among a large collection of edge clients. These clients …

Your noise, my signal: Exploiting switching noise for stealthy data exfiltration from desktop computers

Z Shao, MA Islam, S Ren - Proceedings of the ACM on Measurement …, 2020 - dl.acm.org
Attacks based on power analysis have been long existing and studied, with some recent
works focused on data exfiltration from victim systems without using conventional …

No free charge theorem: A covert channel via usb charging cable on mobile devices

R Spolaor, L Abudahi, V Moonsamy, M Conti… - … and Network Security …, 2017 - Springer
More and more people are regularly using mobile and battery-powered handsets, such as
smartphones and tablets. At the same time, thanks to the technological innovation and to the …

泛在网络环境下隐蔽通道关键技术研究综述

李凤华, 李超洋, 郭超, 李子孚, 房梁, 郭云川 - 通信学报, 2022 - infocomm-journal.com
在泛在网络环境下, 隐蔽通道通过修改系统共享资源, 绕开系统的安全策略传输隐蔽信息,
给计算机和网络系统造成了严重的安全威胁. 针对此问题, 主要从度量, 构建和检测3 …

Design and implementation of a caching system for streaming media over the internet

E Bommaiah, K Guo, M Hofmann… - Proceedings Sixth IEEE …, 2000 - ieeexplore.ieee.org
Congested networks and overloaded servers resulting from the ever growing number of
Internet users contribute to the lack of good quality video streaming over the Internet. We …

Turning federated learning systems into covert channels

G Costa, F Pinelli, S Soderi, G Tolomei - IEEE Access, 2022 - ieeexplore.ieee.org
Federated learning (FL) goes beyond traditional, centralized machine learning by
distributing model training among a large collection of edge clients. These clients …

Gaming the system: tetromino-based covert channel and its impact on mobile security

E Vasilellis, V Botsos, A Anagnostopoulou… - International Journal of …, 2024 - Springer
Trojan droppers consistently emerge as challenging malware threats, particularly within the
Android ecosystem. Traditional malware detection approaches focus on identifying payloads …

E-android: A new energy profiling tool for smartphones

X Gao, D Liu, D Liu, H Wang… - 2017 IEEE 37th …, 2017 - ieeexplore.ieee.org
As the limited battery lifetime remains a major factor restricting the applicability of a
smartphone, significant research efforts have been devoted to understand the energy …