Edge security: Challenges and issues
Edge computing is a paradigm that shifts data processing services to the network edge,
where data are generated. While such an architecture provides faster processing and …
where data are generated. While such an architecture provides faster processing and …
A Review on Network Covert Channel Construction and Attack Detection
MA Khadse, DM Dakhane - Concurrency and Computation …, 2024 - Wiley Online Library
ABSTRACT A covert network channel is a communication channel in which the message is
secretly transmitted to the recipient. Sometimes, covert network channels are vulnerable to …
secretly transmitted to the recipient. Sometimes, covert network channels are vulnerable to …
[PDF][PDF] Covert channel attack to federated learning systems
Federated learning (FL) goes beyond traditional, centralized machine learning by
distributing model training among a large collection of edge clients. These clients …
distributing model training among a large collection of edge clients. These clients …
Your noise, my signal: Exploiting switching noise for stealthy data exfiltration from desktop computers
Z Shao, MA Islam, S Ren - Proceedings of the ACM on Measurement …, 2020 - dl.acm.org
Attacks based on power analysis have been long existing and studied, with some recent
works focused on data exfiltration from victim systems without using conventional …
works focused on data exfiltration from victim systems without using conventional …
No free charge theorem: A covert channel via usb charging cable on mobile devices
More and more people are regularly using mobile and battery-powered handsets, such as
smartphones and tablets. At the same time, thanks to the technological innovation and to the …
smartphones and tablets. At the same time, thanks to the technological innovation and to the …
泛在网络环境下隐蔽通道关键技术研究综述
李凤华, 李超洋, 郭超, 李子孚, 房梁, 郭云川 - 通信学报, 2022 - infocomm-journal.com
在泛在网络环境下, 隐蔽通道通过修改系统共享资源, 绕开系统的安全策略传输隐蔽信息,
给计算机和网络系统造成了严重的安全威胁. 针对此问题, 主要从度量, 构建和检测3 …
给计算机和网络系统造成了严重的安全威胁. 针对此问题, 主要从度量, 构建和检测3 …
Design and implementation of a caching system for streaming media over the internet
Congested networks and overloaded servers resulting from the ever growing number of
Internet users contribute to the lack of good quality video streaming over the Internet. We …
Internet users contribute to the lack of good quality video streaming over the Internet. We …
Turning federated learning systems into covert channels
Federated learning (FL) goes beyond traditional, centralized machine learning by
distributing model training among a large collection of edge clients. These clients …
distributing model training among a large collection of edge clients. These clients …
Gaming the system: tetromino-based covert channel and its impact on mobile security
E Vasilellis, V Botsos, A Anagnostopoulou… - International Journal of …, 2024 - Springer
Trojan droppers consistently emerge as challenging malware threats, particularly within the
Android ecosystem. Traditional malware detection approaches focus on identifying payloads …
Android ecosystem. Traditional malware detection approaches focus on identifying payloads …
E-android: A new energy profiling tool for smartphones
As the limited battery lifetime remains a major factor restricting the applicability of a
smartphone, significant research efforts have been devoted to understand the energy …
smartphone, significant research efforts have been devoted to understand the energy …