-
1
-
-
83155163952
-
High power microwave effects on computer networks
-
York, U.K., Sept. 26-30
-
L. Palisek and L. Suchy, "High power microwave effects on computer networks," in Proc. EMC Europe 2011 York Conf., York, U.K., Sept. 26-30, 2011, pp. 18-21.
-
(2011)
Proc. EMC Europe 2011 York Conf.
, pp. 18-21
-
-
Palisek, L.1
Suchy, L.2
-
2
-
-
4444289299
-
Susceptibility of electronic systems to high-power microwaves: Summary of test experience
-
Aug.
-
M. G. Bäckström and K. G. Lövstrand, "Susceptibility of electronic systems to high-power microwaves: Summary of test experience," IEEE Trans. Electromagn. Compat., vol. 46, no. 3, pp. 396-403, Aug. 2004.
-
(2004)
IEEE Trans. Electromagn. Compat.
, vol.46
, Issue.3
, pp. 396-403
-
-
Bäckström, M.G.1
Lövstrand, K.G.2
-
3
-
-
63549118783
-
Classification of electromagnetic effects at system level
-
Hamburg, Germany, Sep. 8-12
-
F. Sabath, "Classification of electromagnetic effects at system level," in Proc. Electromagn. Compat. EMC Europe Int. Symp. Conf., Hamburg, Germany, Sep. 8-12, 2008, pp. 1-5.
-
(2008)
Proc. Electromagn. Compat. EMC Europe Int. Symp. Conf.
, pp. 1-5
-
-
Sabath, F.1
-
4
-
-
84919951387
-
Event logs generated by an operating system running on a COTS computer during IEMI exposure
-
Dec.
-
C. Kasmi, J. Lopes-Esteves, N. Picard, and M. Renard, "Event logs generated by an operating system running on a COTS computer during IEMI exposure," IEEE Trans. Electromagn. Compat., vol. 56, no. 6, pp. 1723-1726, Dec. 2014.
-
(2014)
IEEE Trans. Electromagn. Compat.
, vol.56
, Issue.6
, pp. 1723-1726
-
-
Kasmi, C.1
Lopes-Esteves, J.2
Picard, N.3
Renard, M.4
-
5
-
-
84863053336
-
Intentional electromagnetic interference for fault analysis on AES block cipher IC
-
Nov. 6-9
-
Y. Hayashi, S. Gomisawa, and Y. Li, "Intentional electromagnetic interference for fault analysis on AES block cipher IC," in Proc. Electromagn. Compat. Integr. Circuits, Nov. 6-9, 2011, pp. 235-240.
-
(2011)
Proc. Electromagn. Compat. Integr. Circuits
, pp. 235-240
-
-
Hayashi, Y.1
Gomisawa, S.2
Li, Y.3
-
6
-
-
84889049630
-
Fault Attacks on AES with faulty ciphertexts only
-
Aug. 20-20
-
T. Fuhr, E. Jaulmes, V. Lomne, and A. Thillard, "Fault Attacks on AES with faulty ciphertexts only," in Proc. Workshop Fault Diagnosis Tolerance Cryptography, Aug. 20-20 2013, pp. 108-118.
-
(2013)
Proc. Workshop Fault Diagnosis Tolerance Cryptography
, pp. 108-118
-
-
Fuhr, T.1
Jaulmes, E.2
Lomne, V.3
Thillard, A.4
-
7
-
-
74049128234
-
Proximity-based access control for implantable medical devices
-
Chicago, IL, USA, Nov. 9-13
-
K. B. Rasmussen, C. Castlluccia, T. Heydt-Benjamin, and S. Capkun, "Proximity-based access control for implantable medical devices," presented at the 16th ACM Conf. Computer Communication Security, Chicago, IL, USA, Nov. 9-13, 2009.
-
(2009)
16th ACM Conf. Computer Communication Security
-
-
Rasmussen, K.B.1
Castlluccia, C.2
Heydt-Benjamin, T.3
Capkun, S.4
-
8
-
-
84969985374
-
On the feasibility of low-power IEMI attacks on communication and control lines
-
Stockholm, Sweden, Aug. 12-15
-
A. Tatematsu, M. Rubinstein, F. Rachidi et al., "On the feasibility of low-power IEMI attacks on communication and control lines," presented at the 34th Progress Electromagn. Res. Symp., Stockholm, Sweden, Aug. 12-15, 2013.
-
(2013)
34th Progress Electromagn. Res. Symp.
-
-
Tatematsu, A.1
Rubinstein, M.2
Rachidi, F.3
-
9
-
-
84970034978
-
-
[Online]
-
Samsung. (2014). How do I Use Samsung S-Voice. [Online]. Available: http://www.samsung.com/us/support/supportOwnersHowToGuidePopup. do?howto-guide-seq=7061&prd-ia-cd=N0000003&map-seq=54784
-
(2014)
How Do I Use Samsung S-Voice
-
-
-
10
-
-
84970015598
-
-
[Online]
-
Apple. (2015). Siri. [Online]. Available: https://www.apple.com/ios/siri/
-
(2015)
Siri
-
-
-
11
-
-
84969934117
-
-
[Online]
-
Google. (2015). Ok Google. [Online]. Available: https://support. google.com/websearch/answer/2940021?hl=en
-
(2015)
Ok Google
-
-
-
12
-
-
84970046330
-
-
[Online]
-
Microsoft. (2015). Meet Cortana. [Online]. Available: http://www.windowsphone.com/en-us/how-to/wp8/cortana/meet-cortana
-
(2015)
Meet Cortana
-
-
-
13
-
-
84969933792
-
-
[Online]
-
Microsoft. (2015). Speech. [Online]. Available: http://www.windowsphone.com/en-us/how-to/wp8/apps/use-speech-on-my-phone
-
(2015)
Speech
-
-
-
15
-
-
84969934133
-
-
[Online]. GitHub
-
Applidium. (2011). Cracking Siri. [Online]. Available: GitHub
-
(2011)
Cracking Siri
-
-
-
17
-
-
84937566397
-
Your voice assistant is mine: How to abuse speakers to steal information and control your phone
-
New York, USA
-
W. Diao, X. Liu, Z. Zhou, and K. Zhang, "Your voice assistant is mine: How to abuse speakers to steal information and control your phone," in Proc. 4th ACM Workshop Security Privacy Smartphones Mobile Devices, New York, USA, 2014, pp. 63-74.
-
(2014)
Proc. 4th ACM Workshop Security Privacy Smartphones Mobile Devices
, pp. 63-74
-
-
Diao, W.1
Liu, X.2
Zhou, Z.3
Zhang, K.4
-
19
-
-
84959466792
-
Automated analysis of the effects induced by radio-frequency pulses on embedded systems for EMC functional safety
-
Canarias Islands, Spain
-
C. Kasmi and J. Lopes Esteves, "Automated analysis of the effects induced by radio-frequency pulses on embedded systems for EMC functional safety," presented at the URSI Atlantic Radio Science Conf., Canarias Islands, Spain, 2015.
-
(2015)
URSI Atlantic Radio Science Conf.
-
-
Kasmi, C.1
Lopes Esteves, J.2
|