메뉴 건너뛰기




Volumn 69, Issue 2-3, 2011, Pages 307-327

Power fingerprinting in SDR integrity assessment for security and regulatory compliance

Author keywords

Integrity Assessment; Pattern Recognition; Power Fingerprinting; SDR

Indexed keywords

ANOMALY DETECTION; COMMUNICATIONS PLATFORM; DETECTION TECHNIQUE; EFFECTIVE MECHANISMS; FEASIBILITY EXPERIMENTS; FLEXIBLE PLATFORMS; INTEGRITY ASSESSMENT; LINEAR DISCRIMINANT ANALYSIS; MALICIOUS ATTACK; MALICIOUS SOFTWARE; OPERATIONAL MODES; POWER FINGERPRINTING; RADIO PLATFORMS; RADIO RESOURCE MANAGEMENT; SDR; SENSITIVE INFORMATIONS; SINGLE-BIT; SOFTWARE IMPLEMENTATION; SOFTWARE-DEFINED RADIOS; SPECTRAL EMISSION; TARGET SYSTEMS; ZERO DAY ATTACK;

EID: 80755130139     PISSN: 09251030     EISSN: 15731979     Source Type: Journal    
DOI: 10.1007/s10470-011-9777-4     Document Type: Article
Times cited : (31)

References (27)
  • 3
  • 4
    • 57349125651 scopus 로고    scopus 로고
    • Behavioral detection of malware on mobile handsets
    • Bose, A.; Hu, X.; Shin, K.; & Park, T. (2008). Behavioral detection of malware on mobile handsets. In ACM mobisys'08.
    • (2008) ACM mobisys'08
    • Bose, A.1    Hu, X.2    Shin, K.3    Park, T.4
  • 5
    • 49949117136 scopus 로고    scopus 로고
    • On the limits of information flow techniques for malware analysis and containment
    • Heidelberg: Springer
    • Cavallaro, L.; Saxena, P.; & Sekar, R. (2008). On the limits of information flow techniques for malware analysis and containment. In Lecture notes in computer science, Vol. 5137/2008, pp. 143-163. Heidelberg: Springer.
    • (2008) Lecture Notes in Computer Science , vol.5137 , Issue.2008 , pp. 143-163
    • Cavallaro, L.1    Saxena, P.2    Sekar, R.3
  • 13
    • 80755186807 scopus 로고    scopus 로고
    • Microchip: Microchip website
    • Microchip: Microchip website. http://www.microchip.com/wireles.
  • 15
    • 27544444280 scopus 로고    scopus 로고
    • Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software
    • Newsom, J.; & Song, D. (2005). Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software. In Proceedings of IEEE symposium on security and privacy.
    • (2005) Proceedings of IEEE Symposium on Security and Privacy
    • Newsom, J.1    Song, D.2
  • 17
    • 37149000571 scopus 로고    scopus 로고
    • Power analysis attacks and countermeasures
    • DOI 10.1109/MDT.2007.200
    • Popp, T.; Oswald, E.; & Mangard, S. (2007). Power analysis attacks and countermeasures. Design & Test of Computers, IEEE, 24, 535-543. (Pubitemid 350253571)
    • (2007) IEEE Design and Test of Computers , vol.24 , Issue.6 , pp. 535-543
    • Popp, T.1    Mangard, S.2    Oswald, E.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.