E3X: Encrypt-Everything-Everywhere ISA eXtensions for Private Computation | 0 | 0.34 | 2022 |
A Data-Based Detection Method Against False Data Injection Attacks | 1 | 0.38 | 2020 |
Backdoor Suppression in Neural Networks using Input Fuzzing and Majority Voting | 1 | 0.36 | 2020 |
I came, I saw, I hacked: Automated Generation of Process-independent Attacks for Industrial Control Systems | 0 | 0.34 | 2020 |
Practical Data-In-Use Protection Using Binary Decision Diagrams | 0 | 0.34 | 2020 |
Demonstration of Man in the Middle Attack on a Feeder Power Factor Correction Unit | 0 | 0.34 | 2020 |
Hardware-Layer Intelligence Collection for Smart Grid Embedded Systems | 2 | 0.40 | 2019 |
CoPHEE: Co-processor for Partially Homomorphic Encrypted Execution | 0 | 0.34 | 2019 |
On automating delayered IC analysis for hardware IP protection. | 0 | 0.34 | 2019 |
Process-Aware Cyberattacks for Thermal Desalination Plants. | 0 | 0.34 | 2019 |
FLEP-SGS<sup>2</sup>: a Flexible and Low-cost Evaluation Platform for Smart Grid Systems Security | 0 | 0.34 | 2019 |
ICSREF: A Framework for Automated Reverse Engineering of Industrial Control Systems Binaries. | 8 | 0.55 | 2019 |
LED Alert: Supply Chain Threats for Stealthy Data Exfiltration in Industrial Control Systems | 1 | 0.40 | 2019 |
TERMinator Suite: Benchmarking Privacy-Preserving Architectures. | 2 | 0.39 | 2018 |
E3: A Framework for Compiling C++ Programs with Encrypted Operands. | 0 | 0.34 | 2018 |
Low-budget Energy Sector Cyberattacks via Open Source Exploitation | 0 | 0.34 | 2018 |
Guest Editor Introduction: Embedded Security Challenge. | 0 | 0.34 | 2018 |
Efficient Detection for Malicious and Random Errors in Additive Encrypted Computation. | 1 | 0.35 | 2018 |
Assessment of Low-Budget Targeted Cyberattacks Against Power Systems. | 0 | 0.34 | 2018 |
Anatomy of Memory Corruption Attacks and Mitigations in Embedded Systems. | 2 | 0.38 | 2018 |
Secure 3D Printing: Reconstructing and Validating Solid Geometries using Toolpath Reverse Engineering. | 1 | 0.48 | 2017 |
Memory-Bounded Randomness For Hardware-Constrained Encrypted Computation | 0 | 0.34 | 2017 |
Security and Privacy in Cyber-Physical Systems: A Survey of Surveys. | 29 | 0.97 | 2017 |
Guest Editors' Introduction: Cyber-Physical Systems Security and Privacy. | 0 | 0.34 | 2017 |
GPS spoofing effect on phase angle monitoring and control in a real-time digital simulator-based hardware-in-the-loop environment. | 2 | 0.38 | 2017 |
The Cybersecurity Landscape in Industrial Control Systems. | 39 | 1.77 | 2016 |
Remote field device fingerprinting using device-specific modbus information | 0 | 0.34 | 2016 |
Cryptographic vote-stealing attacks against a partially homomorphic e-voting architecture | 2 | 0.36 | 2016 |
A Case Study on Implementing False Data Injection Attacks Against Nonlinear State Estimation. | 2 | 0.39 | 2016 |
Malicious Firmware Detection with Hardware Performance Counters. | 4 | 0.39 | 2016 |
Enabling multi-layer cyber-security assessment of Industrial Control Systems through Hardware-In-The-Loop testbeds | 1 | 0.35 | 2016 |
Privacy-preserving functional IP verification utilizing fully homomorphic encryption | 4 | 0.41 | 2015 |
Obfuscated arbitrary computation using cryptographic primitives | 0 | 0.34 | 2015 |
Multiple-Bit Upset Protection in Microprocessor Memory Arrays Using Vulnerability-Based Parity Optimization and Interleaving | 6 | 0.43 | 2015 |
Revisiting Vulnerability Analysis in Modern Microprocessors | 5 | 0.47 | 2015 |
Efficient parallelization of the Discrete Wavelet Transform algorithm using memory-oblivious optimizations | 0 | 0.34 | 2015 |
ConFirm: Detecting Firmware Modifications in Embedded Systems using Hardware Performance Counters | 10 | 0.60 | 2015 |
Extending residue-based fault tolerance to encrypted computation | 1 | 0.36 | 2015 |
Impact of firmware modification attacks on power systems field devices | 6 | 0.52 | 2015 |
The HEROIC Framework: Encrypted Computation without Shared Keys | 18 | 0.74 | 2015 |
Cryptoleq: A Heterogeneous Abstract Machine for Encrypted and Unencrypted Computation. | 7 | 0.59 | 2015 |
Cyber-physical systems: A security perspective | 4 | 0.44 | 2015 |
Trust No One: Thwarting "heartbleed" Attacks Using Privacy-Preserving Computation | 2 | 0.37 | 2014 |
Special session 4B: Elevator talks | 0 | 0.34 | 2014 |
Fabrication Attacks: Zero-Overhead Malicious Modifications Enabling Modern Microprocessor Privilege Escalation | 15 | 0.77 | 2014 |
Special session 8C: E.J. McCluskey doctoral thesis award semi-final | 0 | 0.34 | 2014 |
Special session 8C: E.J. McCluskey doctoral thesis award semi-final | 0 | 0.34 | 2014 |
HEROIC: Homomorphically EncRypted One Instruction Computer | 11 | 0.61 | 2014 |
Innovative engineering outreach using Intel® security and embedded tools | 0 | 0.34 | 2014 |
Investigating large integer arithmetic on Intel Xeon Phi SIMD extensions | 4 | 0.70 | 2014 |