Systematic classification of side-channel attacks: A case study for mobile devices

R Spreitzer, V Moonsamy, T Korak… - … surveys & tutorials, 2017 - ieeexplore.ieee.org
Side-channel attacks on mobile devices have gained increasing attention since their
introduction in 2007. While traditional side-channel attacks, such as power analysis attacks …

Sensors of smart devices in the internet of everything (IoE) era: big opportunities and massive doubts

M Masoud, Y Jaradat, A Manasrah… - Journal of …, 2019 - Wiley Online Library
Smart device industry allows developers and designers to embed different sensors,
processors, and memories in small‐size electronic devices. Sensors are added to enhance …

Hertzbleed: Turning power {Side-Channel} attacks into remote timing attacks on x86

Y Wang, R Paccagnella, ET He, H Shacham… - 31st USENIX Security …, 2022 - usenix.org
Power side-channel attacks exploit data-dependent variations in a CPU's power
consumption to leak secrets. In this paper, we show that on modern Intel (and AMD) x86 …

A comprehensive study of security of internet-of-things

A Mosenia, NK Jha - IEEE Transactions on emerging topics in …, 2016 - ieeexplore.ieee.org
Internet of Things (IoT), also referred to as the Internet of Objects, is envisioned as a
transformative approach for providing numerous services. Compact smart devices constitute …

Ten simple rules for responsible big data research

M Zook, S Barocas, D Boyd, K Crawford… - PLoS computational …, 2017 - journals.plos.org
The use of big data research methods has grown tremendously over the past five years in
both academia and industry. As the size and complexity of available datasets has grown, so …

50 ways to leak your data: An exploration of apps' circumvention of the android permissions system

J Reardon, Á Feal, P Wijesekera, AEB On… - 28th USENIX security …, 2019 - usenix.org
Modern smartphone platforms implement permission-based models to protect access to
sensitive data and system resources. However, apps can circumvent the permission model …

IoT vulnerability assessment for sustainable computing: threats, current solutions, and open challenges

P Anand, Y Singh, A Selwal, M Alazab, S Tanwar… - IEEE …, 2020 - ieeexplore.ieee.org
Over the last few decades, sustainable computing has been widely used in areas like social
computing, artificial intelligence-based agent systems, mobile computing, and Internet of …

{AttriGuard}: A practical defense against attribute inference attacks via adversarial machine learning

J Jia, NZ Gong - 27th USENIX Security Symposium (USENIX Security …, 2018 - usenix.org
Users in various web and mobile applications are vulnerable to attribute inference attacks, in
which an attacker leverages a machine learning classifier to infer a target user's private …

Inferring user routes and locations using zero-permission mobile sensors

S Narain, TD Vo-Huu, K Block… - 2016 IEEE Symposium …, 2016 - ieeexplore.ieee.org
Leakage of user location and traffic patterns is a serious security threat with significant
implications on privacy as reported by recent surveys and identified by the US Congress …

Constructing features for detecting android malicious applications: issues, taxonomy and directions

W Wang, M Zhao, Z Gao, G Xu, H Xian, Y Li… - IEEE …, 2019 - ieeexplore.ieee.org
The number of applications (apps) available for smart devices or Android based IoT (Internet
of Things) has surged dramatically over the past few years. Meanwhile, the volume of ill …