-
1
-
-
84880914335
-
-
Arduino home page. http://www.arduino.cc.
-
-
-
-
2
-
-
80052648896
-
Intrusion detection for advanced metering infrastructures: Requirements and architecture directions
-
R. Berthier, W.H. Sanders, and H. Khurana. Intrusion detection for advanced metering infrastructures: Requirements and architecture directions. In Smart Grid Communications (SmartGridComm), 2010, pages 350-355, 2010.
-
(2010)
Smart Grid Communications (SmartGridComm), 2010
, pp. 350-355
-
-
Berthier, R.1
Sanders, W.H.2
Khurana, H.3
-
4
-
-
85061034567
-
Comprehensive experimental analyses of automotive attack surfaces
-
Berkeley, CA, USA USENIX Association
-
Stephen Checkoway, Damon McCoy, Brian Kantor, Danny Anderson, Hovav Shacham, Stefan Savage, Karl Koscher, Alexei Czeskis, Franziska Roesner, and Tadayoshi Kohno. Comprehensive experimental analyses of automotive attack surfaces. In Proceedings of the 20th USENIX conference on Security, SEC'11, pages 6-6, Berkeley, CA, USA, 2011. USENIX Association.
-
(2011)
Proceedings of the 20th USENIX Conference on Security, SEC'11
, pp. 6-6
-
-
Checkoway, S.1
McCoy, D.2
Kantor, B.3
Anderson, D.4
Shacham, H.5
Savage, S.6
Koscher, K.7
Czeskis, A.8
Roesner, F.9
Kohno, T.10
-
5
-
-
35248822611
-
Oblivious hashing: A stealthy software integrity verification primitive
-
Yuqun Chen, Ramarathnam Venkatesan, Matthew Cary, Ruoming Pang, Saurabh Sinha, and Mariusz H Jakubowski. Oblivious hashing: A stealthy software integrity verification primitive. Work, pages 400-414, 2003.
-
(2003)
Work
, pp. 400-414
-
-
Chen, Y.1
Venkatesan, R.2
Cary, M.3
Pang, R.4
Sinha, S.5
Jakubowski, M.H.6
-
7
-
-
77249138261
-
Smart-grid security issues
-
Himanshu Khurana, Mark Hadley, Ning Lu, and Deborah A. Frincke. Smart-grid security issues. IEEE Security & Privacy, pages 81-85, 2010.
-
(2010)
IEEE Security & Privacy
, pp. 81-85
-
-
Khurana, H.1
Hadley, M.2
Lu, N.3
Frincke, D.A.4
-
8
-
-
51649104949
-
Anatomy of a real-time intrusion prevention system
-
Washington, DC, USA IEEE Computer Society
-
Ricardo Koller, Raju Rangaswami, Joseph Marrero, Igor Hernandez, Geoffrey Smith, Mandy Barsilai, Silviu Necula, S. Masoud Sadjadi, Tao Li, and Krista Merrill. Anatomy of a real-time intrusion prevention system. In Proceedings of the 2008 International Conference on Autonomic Computing, ICAC '08, pages 151-160, Washington, DC, USA, 2008. IEEE Computer Society.
-
(2008)
Proceedings of the 2008 International Conference on Autonomic Computing, ICAC '08
, pp. 151-160
-
-
Koller, R.1
Rangaswami, R.2
Marrero, J.3
Hernandez, I.4
Smith, G.5
Barsilai, M.6
Necula, S.7
Masoud Sadjadi, S.8
Li, T.9
Merrill, K.10
-
9
-
-
39749178297
-
Unified architecture for large-scale attested metering
-
Washington, DC, USA IEEE Computer Society
-
Michael LeMay, George Gross, Carl A. Gunter, and Sanjam Garg. Unified architecture for large-scale attested metering. In Proceedings of the 40th Annual Hawaii International Conference on System Sciences, HICSS '07, pages 115-, Washington, DC, USA, 2007. IEEE Computer Society.
-
(2007)
Proceedings of the 40th Annual Hawaii International Conference on System Sciences, HICSS '07
, pp. 115
-
-
LeMay, M.1
Gross, G.2
Gunter, C.A.3
Garg, S.4
-
11
-
-
67650822699
-
Security and privacy challenges in the smart grid
-
P. McDaniel and S. McLaughlin. Security and privacy challenges in the smart grid. IEEE Security & Privacy, pages 75-77, 2009.
-
(2009)
IEEE Security & Privacy
, pp. 75-77
-
-
McDaniel, P.1
McLaughlin, S.2
-
12
-
-
78751557822
-
Multi-vendor penetration testing in the advanced metering infrastructure
-
New York, NY, USA ACM
-
Stephen McLaughlin, Dmitry Podkuiko, Sergei Miadzvezhanka, Adam Delozier, and Patrick McDaniel. Multi-vendor penetration testing in the advanced metering infrastructure. In Proceedings of the 26th Annual Computer Security Applications Conference, ACSAC '10, pages 107-116, New York, NY, USA, 2010. ACM.
-
(2010)
Proceedings of the 26th Annual Computer Security Applications Conference, ACSAC '10
, pp. 107-116
-
-
McLaughlin, S.1
Podkuiko, D.2
Miadzvezhanka, S.3
Delozier, A.4
McDaniel, P.5
-
14
-
-
84880911702
-
Smart hacking for privacy
-
Berlin, Germany, DEC.
-
U. Greveler B. Justus D. Lhr C. Wegener S. Brinkhaus, D. Carluccio. Smart hacking for privacy. In 28th Chaos Communication Congress, Berlin, Germany, DEC. 2011.
-
(2011)
28th Chaos Communication Congress
-
-
Greveler, U.1
Justus, B.2
Lhr, D.3
Wegener, C.4
Brinkhaus, S.5
Carluccio, D.6
-
15
-
-
56349171224
-
Remote attestation on legacy operating systems with trusted platform modules
-
December
-
Dries Schellekens, Brecht Wyseur, and Bart Preneel. Remote attestation on legacy operating systems with trusted platform modules. Sci. Comput. Program., 74:13-22, December 2008.
-
(2008)
Sci. Comput. Program.
, vol.74
, pp. 13-22
-
-
Schellekens, D.1
Wyseur, B.2
Preneel, B.3
-
16
-
-
33845427178
-
Pioneer: Verifying code integrity and enforcing untampered code execution on legacy systems
-
DOI 10.1145/1095809.1095812
-
Arvind Seshadri, Mark Luk, Elaine Shi, Adrian Perrig, Leendert van Doorn, and Pradeep Khosla. Pioneer: verifying code integrity and enforcing untampered code execution on legacy systems. In Proceedings of the twentieth ACM symposium on Operating systems principles, SOSP '05, pages 1-16, New York, NY, USA, 2005. ACM. (Pubitemid 44892201)
-
(2005)
Operating Systems Review (ACM)
, vol.39
, Issue.5
, pp. 1-16
-
-
Seshadri, A.1
Perrig, A.2
Luk, M.3
Van Doom, L.4
Shi, E.5
Khosla, P.6
|