Systematic classification of side-channel attacks: A case study for mobile devices
R Spreitzer, V Moonsamy, T Korak… - … surveys & tutorials, 2017 - ieeexplore.ieee.org
Side-channel attacks on mobile devices have gained increasing attention since their
introduction in 2007. While traditional side-channel attacks, such as power analysis attacks …
introduction in 2007. While traditional side-channel attacks, such as power analysis attacks …
Sensors of smart devices in the internet of everything (IoE) era: big opportunities and massive doubts
Smart device industry allows developers and designers to embed different sensors,
processors, and memories in small‐size electronic devices. Sensors are added to enhance …
processors, and memories in small‐size electronic devices. Sensors are added to enhance …
Hertzbleed: Turning power {Side-Channel} attacks into remote timing attacks on x86
Power side-channel attacks exploit data-dependent variations in a CPU's power
consumption to leak secrets. In this paper, we show that on modern Intel (and AMD) x86 …
consumption to leak secrets. In this paper, we show that on modern Intel (and AMD) x86 …
A comprehensive study of security of internet-of-things
Internet of Things (IoT), also referred to as the Internet of Objects, is envisioned as a
transformative approach for providing numerous services. Compact smart devices constitute …
transformative approach for providing numerous services. Compact smart devices constitute …
Ten simple rules for responsible big data research
The use of big data research methods has grown tremendously over the past five years in
both academia and industry. As the size and complexity of available datasets has grown, so …
both academia and industry. As the size and complexity of available datasets has grown, so …
50 ways to leak your data: An exploration of apps' circumvention of the android permissions system
J Reardon, Á Feal, P Wijesekera, AEB On… - 28th USENIX security …, 2019 - usenix.org
Modern smartphone platforms implement permission-based models to protect access to
sensitive data and system resources. However, apps can circumvent the permission model …
sensitive data and system resources. However, apps can circumvent the permission model …
IoT vulnerability assessment for sustainable computing: threats, current solutions, and open challenges
Over the last few decades, sustainable computing has been widely used in areas like social
computing, artificial intelligence-based agent systems, mobile computing, and Internet of …
computing, artificial intelligence-based agent systems, mobile computing, and Internet of …
{AttriGuard}: A practical defense against attribute inference attacks via adversarial machine learning
Users in various web and mobile applications are vulnerable to attribute inference attacks, in
which an attacker leverages a machine learning classifier to infer a target user's private …
which an attacker leverages a machine learning classifier to infer a target user's private …
Inferring user routes and locations using zero-permission mobile sensors
Leakage of user location and traffic patterns is a serious security threat with significant
implications on privacy as reported by recent surveys and identified by the US Congress …
implications on privacy as reported by recent surveys and identified by the US Congress …
Constructing features for detecting android malicious applications: issues, taxonomy and directions
The number of applications (apps) available for smart devices or Android based IoT (Internet
of Things) has surged dramatically over the past few years. Meanwhile, the volume of ill …
of Things) has surged dramatically over the past few years. Meanwhile, the volume of ill …