A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2023; you can also visit the original URL.
The file type is application/pdf
.
Filters
Security Analysis of the 3MF Data Format
2023
Proceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses
Based on 3MF's features, we systematized three attack goals: Data Exfiltration, Denial of Service, and UI Spoofing. ...
3D printing is a well-established technology with rapidly increasing usage scenarios both in the industry and consumer context. ...
consumers, and 3D printers are used for the construction of missioncritical systems. ...
doi:10.1145/3607199.3607216
fatcat:cmj2hxkclncqzltrgobjccs4ca
EVALUATION OF ADDITIVE AND SUBTRACTIVE MANUFACTURING FROM THE SECURITY PERSPECTIVE
[chapter]
2017
IFIP Advances in Information and Communication Technology
Because of their reliance on computerization, additive manufacturing devices (or 3D printers) are susceptible to a broad range of attacks. ...
The chapter outlines the additive and subtractive manufacturing workflows, proposes a framework for analyzing attacks on or using additive manufacturing systems and presents the major threat categories ...
A range of physical attacks are also possible; manipulations of source materials can have far-reaching impacts on manufactured objects as well as on 3D printers and their manufacturing environments [48 ...
doi:10.1007/978-3-319-70395-4_2
fatcat:q4uxlpfqifg73hchxqhki5kghm
IoT Network Security: Requirements, Threats, and Countermeasures
[article]
2020
arXiv
pre-print
with a focus on improving the robustness of existing security solutions. ...
Our first contribution highlights viewpoints on IoT security from the perspective of stakeholders such as manufacturers, service providers, consumers, and authorities. ...
Data Exfiltration Attack Exfiltration of sensitive data is a major concern in organization networks. These attacks are common in generalpurpose devices. ...
arXiv:2008.09339v1
fatcat:bnlkgls3pvbspf7og6nxx5krjq
Smartphone Security and Privacy: A Survey on APTs, Sensor-Based Attacks, Side-Channel Attacks, Google Play Attacks, and Defenses
2023
Technologies
Nevertheless, there is a rise in APTs, side-channel attacks, sensor-based attacks, and attacks launched through the Google Play Store. ...
A large number of sophisticated malware attacks as well as advanced persistent threats (APTs) have been launched on smartphone users. ...
Once malware is installed on a device, it can communicate with a remote server controlled by the attacker, allowing them to collect data. ...
doi:10.3390/technologies11030076
fatcat:hvombg4zanbvnmejxw6bknke34
Characteristic Aspects of Additive Manufacturing Security from Security Awareness Perspectives
2019
IEEE Access
In this paper, we analyze the AM Security from three awareness perspectives: exposure to an attack, evaluation of the system, and potential liability for a successful attack. ...
Our analysis shows that, while there is a certain overlap between AM and SM security, the AM requires a separate and unique perspective and approach undertaken by experts with relevant domain expertise ...
Any opinions, findings, and conclusions or recommendations expressed in this material are those of the author(s) and do not necessarily reflect the views of the funding agencies. ...
doi:10.1109/access.2019.2931738
pmid:32117666
pmcid:PMC7047715
fatcat:hldhhe4pn5gjtn3by2galxzb5q
To Catch a Ratter: Monitoring the Behavior of Amateur DarkComet RAT Operators in the Wild
2017
2017 IEEE Symposium on Security and Privacy (SP)
Remote Access Trojans (RATs) give remote attackers interactive control over a compromised machine. ...
During these sessions operators frequently attempted to interact with victims via remote desktop, to capture video, audio, and keystrokes, and to exfiltrate files and credentials. ...
From this, we were able to determine how attackers interact with a victim, including time spent on the machine, user data collected, and so on. ...
doi:10.1109/sp.2017.48
dblp:conf/sp/FarinholtRPDYBM17
fatcat:gfztgkoejzbshi3xlbxom324oi
Freedom to Hack
2017
Social Science Research Network
This Article rejects this outdated approach in the wake of ubiquitous cyber-attacks, imperfect software, and the emerging Internet of Things ecosystem. ...
This results in a reality of highly unsecure Internet-of-Things devices and could potentially lead to serious harms to security and privacy. ...
certain implantable cardiac devices are vulnerable to attacks, which could allow an unauthorized user to control the device and exfiltrate data from it. 189 Surprisingly, medical devices are ridden with ...
doi:10.2139/ssrn.3035518
fatcat:ehta5rnuzfdl5o376vt6y2gb6a
Short-Range Audio Channels Security: Survey of Mechanisms, Applications, and Research Challenges
2020
IEEE Communications Surveys and Tutorials
To provide a rigorous, scientific, security-oriented review of the field, in this paper we survey and classify methods, applications, and use-cases rooted on short-range audio channels for the provisioning ...
Short-range audio channels have a few distinguishing characteristics: ease of use, low deployment costs, and easy to tune frequencies, to cite a few. ...
This publication was partially supported by awards NPRP11S-0109-180242, UREP23-065-1-014, and NPRP X-063-1-014 from the QNRF-Qatar National Research Fund, a member of The Qatar Foundation. ...
doi:10.1109/comst.2020.2969030
fatcat:26sskdeh3faaxmyu32iidlxbp4
SoK - Security and Privacy in the Age of Drones: Threats, Challenges, Solution Mechanisms, and Scientific Gaps
[article]
2019
arXiv
pre-print
However, drones also pose a significant challenge in terms of security and privacy within society (for both individuals and organizations), and many drone related incidents are reported on a daily basis ...
These incidents have called attention to the need to detect and disable drones used for malicious purposes and opened up a new area of research and development for academia and industry, with a market ...
Two studies [54] , [55] showed how to establish a covert channel for data infiltration [54] and exfiltration [55] to/from an organization. ...
arXiv:1903.05155v1
fatcat:4mwsyyupbncydn7k3kc33dhzbm
Invisible Finger: Practical Electromagnetic Interference Attack on Touchscreen-based Electronic Devices
[article]
2024
arXiv
pre-print
Our attack can inject short-tap, long-press, and omni-directional gestures on touchscreens from a distance larger than the average thickness of common tabletops. ...
attack in a practical way. ...
This work is supported by National Institute of Standards and Technology, Intel and National Science Foundation under award number 1818500. ...
arXiv:2402.02227v1
fatcat:ktvjgjafbvarjjwcf2sop4coo4
State of the art analysis
2017
Zenodo
On one side, and probably the most important one, a CHP unit may provide enough electrical power to the kiln to grant its functions even in case of a prolongated blackout on the grid. ...
The DREAM project proposed to find a cogeneration system that would allow a dual fuel feeding wherein one of them would be a bio‐fuel. ...
The exfiltration can be avoided by having an authorization system in the intranet rather than in a remote server. ...
doi:10.5281/zenodo.2602683
fatcat:x7hlyqxlmfhtbdsexu2i2rejlq
Defense Advanced Research Projects Agency (Darpa) Fiscal Year 2016 Budget Estimates
2015
Zenodo
aperture technologies, leveraging alternative launch concepts, and a novel direct-to-user command and data exfiltration architecture. ...
-Train decoders on a subset of domains and cross-validate on novel scan, record, and stimulate data. ...
doi:10.5281/zenodo.1215366
fatcat:cqn5tyfixjanzp5x3tgfkpedri
Defense Advanced Research Projects Agency (Darpa) Fiscal Year 2015 Budget Estimates
2014
Zenodo
better data management. ...
An emphasis in the FY 2015 budget request focuses on research to tailor treatments to patients' unique characteristics, known as "precision medicine." ...
aperture technologies, leveraging alternative launch concepts, and a novel direct-to-user command and data exfiltration architecture. ...
doi:10.5281/zenodo.1215345
fatcat:fjzhmynqjbaafk67q2ckcblj2m
Defense Advanced Research Projects Agency (Darpa) Fiscal Year 2019 Budget Estimates
2018
Zenodo
Efforts focus on identified medical gaps in warfighter carerelated to health monitoring and preventing the spread of infectious disease. ...
and genetic level through cellular,tissue, organ, and whole organism levels. ...
For example, analysis of an in-memory exploit would require detailed data from a few devices, while analysis of a global botnet attack would require summary data from millions of devices. ...
doi:10.5281/zenodo.1215599
fatcat:kxduvg6a5nflhf6iilkwnolobu
Hiding from Whom?
2018
intermédialités
ACKNOWLEDGEMENTS The authors would like to extend their deepest gratitude to a number of individuals who have provided support and feedback in the production of this report, including (in alphabetical ...
order) Bram Abramson, Nate Cardozo, Masashi Crete-Nishihata, Ron Deibert, Mickael E.B., Andrew Hilts, Jeffrey Knockel, Adam Molnar, Christopher Prince, Tina Salameh, Amie Stepanovich, and Mari Jing Zhou ...
reasons for this limitation (e.g., concerns about "remote wipe" features, which can remotely delete data from a device). ...
doi:10.7202/1058473ar
fatcat:z2x3cfbpczehjgpmlzxjsfkrd4
« Previous
Showing results 1 — 15 out of 23 results