-
1
-
-
84944043525
-
-
SmartFactory | From Vision to Reality in Factory Technologies
-
SmartFactory | From Vision to Reality in Factory Technologies. International Federation of Automatic Control, 2008.
-
(2008)
International Federation of Automatic Control
-
-
-
2
-
-
84875751668
-
Security of industrial sensor network-based remote substations in the context of the internet of things
-
C. Alcaraz, R. Roman, P. Najera, and J. Lopez. Security of industrial sensor network-based remote substations in the context of the internet of things. Ad Hoc Netw., 11(3), 2013.
-
(2013)
Ad Hoc Netw
, vol.11
, Issue.3
-
-
Alcaraz, C.1
Roman, R.2
Najera, P.3
Lopez, J.4
-
6
-
-
84944111596
-
TyTAN: Tiny trust anchor for tiny devices
-
F. Brasser, P. Koeberl, B. E. Mahjoub, A.-R. Sadeghi, and C. Wachsmann. TyTAN: Tiny trust anchor for tiny devices. In Design Automation Conference (DAC). ACM, 2015.
-
(2015)
Design Automation Conference (DAC). ACM
-
-
Brasser, F.1
Koeberl, P.2
Mahjoub, B.E.3
Sadeghi, A.-R.4
Wachsmann, C.5
-
7
-
-
20944436226
-
The myths and facts behind cyber security risks for industrial control systems
-
E. Byres and J. Lowe. The myths and facts behind cyber security risks for industrial control systems. Technical report, PA Consulting Group, 2004.
-
(2004)
Technical Report, PA Consulting Group
-
-
Byres, E.1
Lowe, J.2
-
8
-
-
85061034567
-
Comprehensive experimental analyses of automotive attack surfaces
-
S. Checkoway, D. McCoy, B. Kantor, D. Anderson, H. Shacham, S. Savage, K. Koscher, A. Czeskis, F. Roesner, and T. Kohno. Comprehensive experimental analyses of automotive attack surfaces. In USENIX Conference on Security. USENIX Association, 2011.
-
(2011)
USENIX Conference on Security. USENIX Association
-
-
Checkoway, S.1
McCoy, D.2
Kantor, B.3
Anderson, D.4
Shacham, H.5
Savage, S.6
Koscher, K.7
Czeskis, A.8
Roesner, F.9
Kohno, T.10
-
12
-
-
21644440888
-
Security for industrial communication systems
-
D. Dzung, M. Naedele, T. von Hó, and M. Crevatin. Security for industrial communication systems. Proceedings of the IEEE, 93(6), 2005.
-
(2005)
Proceedings of the IEEE
, vol.93
, Issue.6
-
-
Dzung, D.1
Naedele, M.2
Von Hó, T.3
Crevatin, M.4
-
15
-
-
84903846058
-
A minimalist approach to remote attestation
-
A. Francillon, Q. Nguyen, K. B. Rasmussen, and G. Tsudik. A minimalist approach to remote attestation. In Conference on Design, Automation &Test in Europe (DATE). European Design and Automation Association, 2014.
-
(2014)
Conference on Design, Automation &Test in Europe (DATE). European Design and Automation Association
-
-
Francillon, A.1
Nguyen, Q.2
Rasmussen, K.B.3
Tsudik, G.4
-
16
-
-
70450253602
-
Detecting code alteration by creating a temporary memory bottleneck
-
R. W. Gardner, S. Garera, and A. D. Rubin. Detecting code alteration by creating a temporary memory bottleneck. Trans. Info. For. Sec., 4(4), 2009.
-
(2009)
Trans. Info. For. Sec
, vol.4
, Issue.4
-
-
Gardner, R.W.1
Garera, S.2
Rubin, A.D.3
-
18
-
-
83555176391
-
Security challenges in the IP-based internet of things
-
T. Heer, O. Garcia-Morchon, R. Hummen, S. L. Keoh, S. S. Kumar, and K. Wehrle. Security challenges in the IP-based internet of things. Wirel. Pers. Commun., 61(3), 2011.
-
(2011)
Wirel. Pers. Commun
, vol.61
, Issue.3
-
-
Heer, T.1
Garcia-Morchon, O.2
Hummen, R.3
Keoh, S.L.4
Kumar, S.S.5
Wehrle, K.6
-
20
-
-
84914168458
-
Using innovative instructions to create trustworthy software solutions
-
M. Hoekstra, R. Lal, P. Pappachan, V. Phegade, and J. Del Cuvillo. Using innovative instructions to create trustworthy software solutions. In Hardware and Architectural Support for Security and Privacy (HASP). ACM, 2013.
-
(2013)
Hardware and Architectural Support for Security and Privacy (HASP). ACM
-
-
Hoekstra, M.1
Lal, R.2
Pappachan, P.3
Phegade, V.4
Del Cuvillo, J.5
-
21
-
-
84944090355
-
Lights off the darkness of the smart meters
-
A. G. Illera and J. V. Vidal. Lights off The darkness of the smart meters. In BlackHat Europe, 2014.
-
(2014)
BlackHat Europe
-
-
Illera, A.G.1
Vidal, J.V.2
-
26
-
-
84903145698
-
PUFatt: Embedded platform attestation based on novel processor-based PUFs
-
J. Kong, F. Koushanfar, P. K. Pendyala, A.-R. Sadeghi, and C. Wachsmann. PUFatt: Embedded platform attestation based on novel processor-based PUFs. In Design Automation Conference (DAC). ACM, 2014.
-
(2014)
Design Automation Conference (DAC). ACM
-
-
Kong, J.1
Koushanfar, F.2
Pendyala, P.K.3
Sadeghi, A.-R.4
Wachsmann, C.5
-
27
-
-
77955201139
-
Experimental security analysis of a modern automobile
-
K. Koscher, A. Czeskis, F. Roesner, S. Patel, T. Kohno, S. Checkoway, D. McCoy, B. Kantor, D. Anderson, H. Shacham, and S. Savage. Experimental security analysis of a modern automobile. In IEEE Symposium on Security and Privacy (S&P), 2010.
-
(2010)
IEEE Symposium on Security and Privacy (S&P)
-
-
Koscher, K.1
Czeskis, A.2
Roesner, F.3
Patel, S.4
Kohno, T.5
Checkoway, S.6
McCoy, D.7
Kantor, B.8
Anderson, D.9
Shacham, H.10
Savage, S.11
-
29
-
-
84878354800
-
New results for timing-based attestation
-
X. Kovah, C. Kallenberg, C. Weathers, A. Herzog, M. Albin, and J. Butterworth. New results for timing-based attestation. In IEEE Symposium on Security and Privacy (S&P), 2012.
-
(2012)
IEEE Symposium on Security and Privacy (S&P)
-
-
Kovah, X.1
Kallenberg, C.2
Weathers, C.3
Herzog, A.4
Albin, M.5
Butterworth, J.6
-
31
-
-
3042781457
-
Crossover: Online pests plaguing the off line world
-
E. Levy. Crossover: Online pests plaguing the off line world. IEEE Security Privacy, 1(6), 2003.
-
(2003)
IEEE Security Privacy
, vol.1
, Issue.6
-
-
Levy, E.1
-
33
-
-
84893572193
-
Cyber security and privacy issues in smart grids
-
J. Liu, Y. Xiao, S. Li, W. Liang, and C. L. P. Chen. Cyber security and privacy issues in smart grids. IEEE Communications Surveys Tutorials, 14(4), 2012.
-
(2012)
IEEE Communications Surveys Tutorials
, vol.14
, Issue.4
-
-
Liu, J.1
Xiao, Y.2
Li, S.3
Liang, W.4
Chen, C.L.P.5
-
35
-
-
77955186544
-
TrustVisor: Efficient TCB reduction and attestation
-
J. McCune, Y. Li, N. Qu, Z. Zhou, A. Datta, V. Gligor, and A. Perrig. TrustVisor: Efficient TCB reduction and attestation. In IEEE Symposium on Security and Privacy (S&P), 2010.
-
(2010)
IEEE Symposium on Security and Privacy (S&P)
-
-
McCune, J.1
Li, Y.2
Qu, N.3
Zhou, Z.4
Datta, A.5
Gligor, V.6
Perrig, A.7
-
36
-
-
84893423195
-
Innovative instructions and software model for isolated execution
-
F. McKeen, I. Alexandrovich, A. Berenzon, C. V. Rozas, H. Shá, V. Shanbhogue, and U. R. Savagaonkar. Innovative instructions and software model for isolated execution. In Hardware and Architectural Support for Security and Privacy (HASP). ACM, 2013.
-
(2013)
Hardware and Architectural Support for Security and Privacy (HASP). ACM
-
-
McKeen, F.1
Alexandrovich, I.2
Berenzon, A.3
Rozas, C.V.4
Shá, H.5
Shanbhogue, V.6
Savagaonkar, U.R.7
-
37
-
-
80052680150
-
An overview of privacy and security issues in the internet of things
-
Springer
-
C. Medaglia and A. Serbanati. An overview of privacy and security issues in the internet of things. In The Internet of Things. Springer, 2010.
-
(2010)
The Internet of Things
-
-
Medaglia, C.1
Serbanati, A.2
-
38
-
-
84942531962
-
I know where you are: Proofs of presence resilient to malicious provers
-
M. Miettinen, N. Asokan, F. Koushanfar, T. D. Nguyen, J. Rios, A.-R. Sadeghi, M. Sobhani, and S. Yellapantula. I know where you are: Proofs of presence resilient to malicious provers. In ACM Symposium on Information, Computer and Communications Security (ASIACCS). ACM, 2015.
-
(2015)
ACM Symposium on Information, Computer and Communications Security (ASIACCS). ACM
-
-
Miettinen, M.1
Asokan, N.2
Koushanfar, F.3
Nguyen, T.D.4
Rios, J.5
Sadeghi, A.-R.6
Sobhani, M.7
Yellapantula, S.8
-
39
-
-
84910661619
-
Context-based zero-interaction pairing and key evolution for advanced personal devices
-
M. Miettinen, N. Asokan, T. D. Nguyen, A.-R. Sadeghi, and M. Sobhani. Context-based zero-interaction pairing and key evolution for advanced personal devices. In Conference on Computer and Communications Security (CCS). ACM, 2014.
-
(2014)
Conference on Computer and Communications Security (CCS). ACM
-
-
Miettinen, M.1
Asokan, N.2
Nguyen, T.D.3
Sadeghi, A.-R.4
Sobhani, M.5
-
41
-
-
84944090367
-
A survey of remote automotive attack surfaces
-
C. Miller and C. Valasek. A survey of remote automotive attack surfaces. In BlackHat USA, 2014.
-
(2014)
BlackHat USA
-
-
Miller, C.1
Valasek, C.2
-
42
-
-
84861997111
-
Survey internet of things: Vision, applications and research challenges
-
D. Miorandi, S. Sicari, F. De Pellegrini, and I. Chlamtac. Survey internet of things: Vision, applications and research challenges. Ad Hoc Netw., 10(7), 2012.
-
(2012)
Ad Hoc Netw
, vol.10
, Issue.7
-
-
Miorandi, D.1
Sicari, S.2
De Pellegrini, F.3
Chlamtac, I.4
-
44
-
-
13244278880
-
-
P. Nixon, W. Wagealla, C. English, and S. Terzis. Security, privacy and trust issues in smart environments, 2004.
-
(2004)
Security, Privacy and Trust Issues in Smart Environments
-
-
Nixon, P.1
Wagealla, W.2
English, C.3
Terzis, S.4
-
45
-
-
85076321179
-
Sancus: Low-cost trustworthy extensible networked devices with a zero-software trusted computing base
-
J. Noorman, P. Agten, W. Daniels, R. Strackx, A. Van Herrewege, C. Huygens, B. Preneel, I. Verbauwhede, and F. Piessens. Sancus: Low-cost trustworthy extensible networked devices with a zero-software trusted computing base. In USENIX Conference on Security. USENIX Association, 2013.
-
(2013)
USENIX Conference on Security. USENIX Association
-
-
Noorman, J.1
Agten, P.2
Daniels, W.3
Strackx, R.4
Van Herrewege, A.5
Huygens, C.6
Preneel, B.7
Verbauwhede, I.8
Piessens, F.9
-
46
-
-
84889021626
-
OASIS: On achieving a sanctuary for integrity and secrecy on untrusted platforms
-
E. Owusu, J. Guajardo, J. McCune, J. Newsome, A. Perrig, and A. Vasudevan. OASIS: On achieving a sanctuary for integrity and secrecy on untrusted platforms. In ACM Conference on Computer &Communications Security (CCS). ACM, 2013.
-
(2013)
ACM Conference on Computer &Communications Security (CCS). ACM
-
-
Owusu, E.1
Guajardo, J.2
McCune, J.3
Newsome, J.4
Perrig, A.5
Vasudevan, A.6
-
47
-
-
84944090370
-
SMATT: Smart meter attestation using multIPle target selection and copy-proof memory
-
Springer
-
H. Park, D. Seo, H. Lee, and A. Perrig. SMATT: Smart meter attestation using multIPle target selection and copy-proof memory. In Computer Science and its Applications. Springer, 2012.
-
(2012)
Computer Science and Its Applications
-
-
Park, H.1
Seo, D.2
Lee, H.3
Perrig, A.4
-
50
-
-
84869391518
-
Electricity for free | the dirty underbelly of SCADA and smart meters
-
J. Pollet and J. Cummins. Electricity for free | The dirty underbelly of SCADA and smart meters. In BlackHat USA, 2010.
-
(2010)
BlackHat USA
-
-
Pollet, J.1
Cummins, J.2
-
53
-
-
85050380525
-
The third industrial revolution: How lateral power is transforming energy, the economy, and the world
-
J. Rifkin. The Third Industrial Revolution: How Lateral Power is Transforming Energy, the Economy, and the World. Palgrave MacMillan, 2011.
-
(2011)
Palgrave MacMillan
-
-
Rifkin, J.1
-
55
-
-
84905002818
-
A primer on hardware security: Models, methods, and metrics
-
M. Rostami, F. Koushanfar, and R. Karri. A primer on hardware security: Models, methods, and metrics. Proceedings of the IEEE, 2014.
-
(2014)
Proceedings of the IEEE
-
-
Rostami, M.1
Koushanfar, F.2
Karri, R.3
-
58
-
-
34247361254
-
SCUBA: Secure code update by attestation in sensor networks
-
A. Seshadri, M. Luk, A. Perrig, L. van Doorn, and P. Khosla. SCUBA: Secure code update by attestation in sensor networks. In ACM Workshop on Wireless Security (WiSe). ACM, 2006.
-
(2006)
ACM Workshop on Wireless Security (WiSe). ACM
-
-
Seshadri, A.1
Luk, M.2
Perrig, A.3
Van Doorn, L.4
Khosla, P.5
-
59
-
-
84885617227
-
Pioneer: Verifying code integrity and enforcing untampered code execution on legacy systems
-
A. Seshadri, M. Luk, E. Shi, A. Perrig, L. van Doorn, and P. Khosla. Pioneer: Verifying code integrity and enforcing untampered code execution on legacy systems. In ACM Symposium on Operating Systems PrincIPles (SOSP). ACM, 2005.
-
(2005)
ACM Symposium on Operating Systems PrincIPles (SOSP). ACM
-
-
Seshadri, A.1
Luk, M.2
Shi, E.3
Perrig, A.4
Van Doorn, L.5
Khosla, P.6
-
61
-
-
84936865356
-
Shielding and securing integrated circuits with sensors
-
D. Shahrjerdi, J. Rajendran, S. Garg, F. Koushanfar, and R. Karri. Shielding and securing integrated circuits with sensors. In Computer-Aided Design (ICCAD), 2014 IEEE/ACM International Conference on. IEEE, 2014.
-
(2014)
Computer-Aided Design (ICCAD), 2014 IEEE/ACM International Conference On. IEEE
-
-
Shahrjerdi, D.1
Rajendran, J.2
Garg, S.3
Koushanfar, F.4
Karri, R.5
-
62
-
-
84944090379
-
Industrial control systems: Pentesting PLCs 101
-
A. Soullie. Industrial control systems: Pentesting PLCs 101. In BlackHat Europe, 2014.
-
(2014)
BlackHat Europe
-
-
Soullie, A.1
-
64
-
-
1142280988
-
AEGIS: Architecture for tamper-evident and tamper-resistant processing
-
G. E. Suh, D. Clarke, B. Gassend, M. van Dijk, and S. Devadas. AEGIS: Architecture for tamper-evident and tamper-resistant processing. In Annual International Conference on Supercomputing (CIS). ACM, 2003.
-
(2003)
Annual International Conference on Supercomputing (CIS). ACM
-
-
Suh, G.E.1
Clarke, D.2
Gassend, B.3
Van Dijk, M.4
Devadas, S.5
-
66
-
-
84944090382
-
Using contextual co-presence to strengthen zero-interaction authentication: Design, integration and usability
-
H. T. T. Truong, X. Gao, B. Shresthab, N. Saxena, N. Asokan, and P. Nurmi. Using contextual co-presence to strengthen zero-interaction authentication: Design, integration and usability. Pervasive and Mobile Computing, 2014.
-
(2014)
Pervasive and Mobile Computing
-
-
Truong, H.T.T.1
Gao, X.2
Shresthab, B.3
Saxena, N.4
Asokan, N.5
Nurmi, P.6
-
67
-
-
84944090383
-
-
Trusted Computing Group (TCG). Website, 2011
-
Trusted Computing Group (TCG). Website, 2011.
-
-
-
-
68
-
-
84871997733
-
CARMA: A hardware tamper-resistant isolated execution environment on commodity x86 platforms
-
A. Vasudevan, J. McCune, J. Newsome, A. Perrig, and L. van Doorn. CARMA: A hardware tamper-resistant isolated execution environment on commodity x86 platforms. In ACM Symposium on Information, Computer and Communications Security (ASIACCS). ACM, 2012.
-
(2012)
ACM Symposium on Information, Computer and Communications Security (ASIACCS). ACM
-
-
Vasudevan, A.1
McCune, J.2
Newsome, J.3
Perrig, A.4
Van Doorn, L.5
-
69
-
-
85071892740
-
Internet of Things | from Research and Innovation to Market Deployment
-
O. Vermesan and P. Friess. Internet of Things | From Research and Innovation to Market Deployment. River Publishers, 2014.
-
(2014)
River Publishers
-
-
Vermesan, O.1
Friess, P.2
-
71
-
-
84944052400
-
-
M. Waidner, M. Kasper, T. Henkel, C. Rudolph, and O. Küch. Eberbacher Gespräch zu "Sicherheit in der Industrie 4.0", 2013.
-
(2013)
Sicherheit in der Industrie 4.0
-
-
Waidner, M.1
Kasper, M.2
Henkel, T.3
Rudolph, C.4
Küch, O.5
Gesprächzu, E.6
-
72
-
-
70349253246
-
Trusted computing building blocks for embedded linux-based ARM Trustzone platforms
-
J. Winter. Trusted computing building blocks for embedded linux-based ARM Trustzone platforms. In ACM Workshop on Scalable Trusted Computing (STC). ACM, 2008.
-
(2008)
ACM Workshop on Scalable Trusted Computing (STC). ACM
-
-
Winter, J.1
-
75
-
-
84921416016
-
Detecting industrial control malware using automated PLC code analytics
-
S. Zonouz, J. Rrushi, and S. McLaughlin. Detecting industrial control malware using automated PLC code analytics. IEEE Security and Privacy, 12(6), 2014.
-
(2014)
IEEE Security and Privacy
, vol.12
, Issue.6
-
-
Zonouz, S.1
Rrushi, J.2
McLaughlin, S.3
-
76
-
-
78649974194
-
Smartfactory | towards a factory of things
-
D. Zuehlke. Smartfactory | towards a factory of things. Annual Reviews in Control, 34(1), 2010.
-
(2010)
Annual Reviews in Control
, vol.34
, Issue.1
-
-
Zuehlke, D.1
|