Physical fault injection and side-channel attacks on mobile devices: A comprehensive analysis (Englisch)
- Neue Suche nach: Shepherd, Carlton
- Weitere Informationen zu Shepherd, Carlton:
- https://orcid.org/0000-0002-7366-9034
- Neue Suche nach: Markantonakis, Konstantinos
- Neue Suche nach: van Heijningen, Nico
- Neue Suche nach: Aboulkassimi, Driss
- Neue Suche nach: Gaine, Clément
- Weitere Informationen zu Gaine, Clément:
- https://orcid.org/0000-0002-7161-9842
- Neue Suche nach: Heckmann, Thibaut
- Neue Suche nach: Naccache, David
- Neue Suche nach: Shepherd, Carlton
- Neue Suche nach: Markantonakis, Konstantinos
- Neue Suche nach: van Heijningen, Nico
- Neue Suche nach: Aboulkassimi, Driss
- Neue Suche nach: Gaine, Clément
- Neue Suche nach: Heckmann, Thibaut
- Neue Suche nach: Naccache, David
In:
Computers and Security
;
111
;
2021
-
ISSN:
- Aufsatz (Zeitschrift) / Elektronische Ressource
-
Titel:Physical fault injection and side-channel attacks on mobile devices: A comprehensive analysis
-
Beteiligte:Shepherd, Carlton ( Autor:in ) / Markantonakis, Konstantinos ( Autor:in ) / van Heijningen, Nico ( Autor:in ) / Aboulkassimi, Driss ( Autor:in ) / Gaine, Clément ( Autor:in ) / Heckmann, Thibaut ( Autor:in ) / Naccache, David ( Autor:in )
-
Erschienen in:Computers and Security ; 111
-
Erscheinungsdatum:12.09.2021
-
ISSN:
-
DOI:
-
Medientyp:Aufsatz (Zeitschrift)
-
Format:Elektronische Ressource
-
Sprache:Englisch
-
Schlagwörter:
-
Datenquelle:
Inhaltsverzeichnis – Band 111
Zeige alle Jahrgänge und Ausgaben
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
-
The moderating effect of abusive supervision on information security policy compliance: Evidence from the hospitality industryXu, Jian / Wang, Xuequn / Yan, Lvxin et al. | 2021
-
On the adoption of static analysis for software security assessment–A case study of an open-source e-government projectNguyen-Duc, Anh / Do, Manh Viet / Luong Hong, Quan / Nguyen Khac, Kiem / Nguyen Quang, Anh et al. | 2021
-
Exploiting side-channel leaks in web traffic of incremental searchLi, Ding / Lin, Wei / Lu, Bin / Zhu, Yuefei et al. | 2021
-
A Secure Mutual authentication approach to fog computing environmentKalaria, Rudri / Kayes, A.S.M. / Rahayu, Wenny / Pardede, Eric et al. | 2021
-
CPMTD: Cyber-physical moving target defense for hardening the security of power system against false data injected attackHu, Yifan / Zhu, Peidong / Xun, Peng / Liu, Bo / Kang, Wenjie / Xiong, Yinqiao / Shi, Weiheng et al. | 2021
-
Ransomware: Recent advances, analysis, challenges and future research directionsBeaman, Craig / Barkworth, Ashley / Akande, Toluwalope David / Hakak, Saqib / Khan, Muhammad Khurram et al. | 2021
-
A Security Gateway for power distribution systems in open networksAndrade, Eduardo / Granjal, Jorge / Vilela, João P. / Arantes, Carlos et al. | 2021
-
A novel and universal GAN-based countermeasure to recover adversarial examples to benign examplesYang, Rui / Cao, Tian-Jie / Chen, Xiu-Qing / Zhang, Feng-Rong et al. | 2021
-
Network defense decision-making based on a stochastic game system and a deep recurrent Q-networkLiu, Xiaohu / Zhang, Hengwei / Dong, Shuqin / Zhang, Yuchen et al. | 2021
-
Research on lightweight anomaly detection of multimedia traffic in edge computingZhao, Xu / Huang, Guangqiu / Jiang, Jin / Gao, Ling / Li, Maozhen et al. | 2021
-
On Android’s activity hijacking preventionLyvas, Christos / Lambrinoudakis, Costas / Geneiatakis, Dimitris et al. | 2021
-
Physical fault injection and side-channel attacks on mobile devices: A comprehensive analysisShepherd, Carlton / Markantonakis, Konstantinos / van Heijningen, Nico / Aboulkassimi, Driss / Gaine, Clément / Heckmann, Thibaut / Naccache, David et al. | 2021
-
-Anonymity in practice: How generalisation and suppression affect machine learning classifiersSlijepčević, Djordje / Henzl, Maximilian / Klausner, Lukas Daniel / Dam, Tobias / Kieseberg, Peter / Zeppelzauer, Matthias et al. | 2021
-
Authentication and Identity Management of IoHT Devices: Achievements, Challenges, and Future DirectionsMamdouh, Moustafa / Awad, Ali Ismail / Khalaf, Ashraf A.M. / Hamed, Hesham F.A. et al. | 2021
-
Editorial Board| 2019
-
On the Effectiveness of Ransomware Decryption ToolsFiliz, Burak / Arief, Budi / Cetin, Orcun / Hernandez-Castro, Julio et al. | 2021
-
Measuring Web Session Security at ScaleCalzavara, Stefano / Jonker, Hugo / Krumnow, Benjamin / Rabitti, Alvise et al. | 2021
-
A Survey Of differential privacy-based techniques and their applicability to location-Based servicesKim, Jong Wook / Edemacu, Kennedy / Kim, Jong Seon / Chung, Yon Dohn / Jang, Beakcheol et al. | 2021
-
Evaluating fallback authentication research: A systematic literature reviewAlHusain, Reem / Alkhalifah, Ali et al. | 2021
-
Dynamic user-centric access control for detection of ransomware attacksMcIntosh, Timothy / Kayes, A.S.M. / Chen, Yi-Ping Phoebe / Ng, Alex / Watters, Paul et al. | 2021
-
A success model for cyber threat intelligence management platformsZibak, Adam / Sauerwein, Clemens / Simpson, Andrew et al. | 2021
-
Study on the intelligent honeynet model for containing the spread of industrial virusesSheng, Chuan / Yao, Yu / Fu, Qiang / Yang, Wei / Liu, Ying et al. | 2021
-
The effectiveness of zoom touchscreen gestures for authentication and identification and its changes over timeWang, Leran / Hossain, Md Shafaeat / Pulfrey, Joshua / Lancor, Lisa et al. | 2021
-
SELF: A method of searching for library functions in stripped binary codeLiu, Xueqian / Cao, Shoufeng / Cao, Zhenzhong / Gao, Qu / Wan, Lin / Wang, Fengyu et al. | 2021
-
Malbert: A novel pre-training method for malware detectionXu, Zhifeng / Fang, Xianjin / Yang, Gaoming et al. | 2021
-
DouBiGRU-A: Software defect detection algorithm based on attention mechanism and double BiGRUZhao, Jinxiong / Guo, Sensen / Mu, Dejun et al. | 2021
-
CTI-SOC2M2 – The quest for mature, intelligence-driven security operations and incident response capabilitiesSchlette, Daniel / Vielberth, Manfred / Pernul, Günther et al. | 2021
-
A Methodology For Large-Scale Identification of Related Accounts in Underground ForumsCabrero-Holgueras, José / Pastrana, Sergio et al. | 2021
-
Metadata based need-to-know view in large-scale video surveillance systemsSultan, Shizra / Jensen, Christian D. et al. | 2021
-
Constrained top-k nearest fuzzy keyword queries on encrypted graph in road networkSun, Fangyuan / Yu, Jia / Ge, Xinrui / Yang, Ming / Kong, Fanyu et al. | 2021
-
MapperDroid: Verifying app capabilities from description to permissions and API callsSolanki, Rajendra Kumar / Laxmi, Vijay / Bezawada, Bruhadeshwar / Gaur, Manoj Singh et al. | 2021