|
|
|
Marcin Aftowicz, Ievgen Kabin, Zoya Dyka and Peter Langendörfer
While IoT technology makes industries, cities, and homes smarter, it also opens the door to security risks. With the right equipment and physical access to the devices, the attacker can leverage side-channel information, like timing, power consumption, o...
ver más
|
|
|
|
|
|
|
Thomas Mountford, Abhijitt Dhavlle, Andrew Tevebaugh, Naseef Mansoor, Sai Manoj Pudukotai Dinakarrao and Amlan Ganguly
In modern computing, which relies on the interconnection of networks used in many/multi-core systems, any system can be critically subverted if the interconnection is compromised. This can be done in a multitude of ways, but the threat of a hardware Troj...
ver más
|
|
|
|
|
|
|
Kunj Joshi, Chintan Bhatt, Kaushal Shah, Dwireph Parmar, Juan M. Corchado, Alessandro Bruno and Pier Luigi Mazzeo
Security in the blockchain has become a topic of concern because of the recent developments in the field. One of the most common cyberattacks is the so-called phishing attack, wherein the attacker tricks the miner into adding a malicious block to the cha...
ver más
|
|
|
|
|
|
|
Ernesto Cadena Muñoz, Gustavo Chica Pedraza, Rafael Cubillos-Sánchez, Alexander Aponte-Moreno and Mónica Espinosa Buitrago
The primary user emulation (PUE) attack is one of the strongest attacks in mobile cognitive radio networks (MCRN) because the primary users (PU) and secondary users (SU) are unable to communicate if a malicious user (MU) is present. In the literature, so...
ver más
|
|
|
|
|
|
|
Dominic Lightbody, Duc-Minh Ngo, Andriy Temko, Colin C. Murphy and Emanuel Popovici
This study proposes the wider use of non-intrusive side-channel power data in cybersecurity for intrusion detection. An in-depth analysis of side-channel IoT power behaviour is performed on two well-known IoT devices?a Raspberry Pi 3 model B and a Dragon...
ver más
|
|
|
|
|
|
|
Konstantinos Ntafloukas, Liliana Pasquale, Beatriz Martinez-Pastor and Daniel P. McCrum
Transportation networks are fundamental to the efficient and safe functioning of modern societies. In the past, physical and cyber space were treated as isolated environments, resulting in transportation network being considered vulnerable only to threat...
ver más
|
|
|
|
|
|
|
Kai Lehniger and Peter Langendörfer
With the increasing popularity of IoT (Internet-of-Things) devices, their security becomes an increasingly important issue. Buffer overflow vulnerabilities have been known for decades, but are still relevant, especially for embedded devices where certain...
ver más
|
|
|
|
|
|
|
Rabia Khan, Amjad Mehmood, Zeeshan Iqbal, Carsten Maple and Gregory Epiphaniou
Security has been the most widely researched topic, particularly within IoT, and has been considered as the major hurdle in the adoption of different applications of IoT. When it comes to IoV, security is considered as the most inevitable component to en...
ver más
|
|
|
|
|
|
|
Junkai Yi and Xiaoyan Liu
Penetration testing is an important method to evaluate the security degree of a network system. The importance of penetration testing attack path planning lies in its ability to simulate attacker behavior, identify vulnerabilities, reduce potential losse...
ver más
|
|
|
|
|
|
|
Rehna Batool, Nargis Bibi, Nazeer Muhammad and Samah Alhazmi
Cognitive Radio Network (CRN) is an emerging technology used to solve spectrum shortage problems in wireless communications. In CRN, unlicensed secondary users (SUs) and licensed primary users (PUs) use spectrum resources at the same time by avoiding any...
ver más
|
|
|
|