Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








23 Hits in 4.1 sec

Security Analysis of the 3MF Data Format

Jost Rossel, Vladislav Mladenov, Juraj Somorovsky
2023 Proceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses  
Based on 3MF's features, we systematized three attack goals: Data Exfiltration, Denial of Service, and UI Spoofing.  ...  3D printing is a well-established technology with rapidly increasing usage scenarios both in the industry and consumer context.  ...  consumers, and 3D printers are used for the construction of missioncritical systems.  ... 
doi:10.1145/3607199.3607216 fatcat:cmj2hxkclncqzltrgobjccs4ca

EVALUATION OF ADDITIVE AND SUBTRACTIVE MANUFACTURING FROM THE SECURITY PERSPECTIVE [chapter]

Mark Yampolskiy, Wayne King, Gregory Pope, Sofia Belikovetsky, Yuval Elovici
2017 IFIP Advances in Information and Communication Technology  
Because of their reliance on computerization, additive manufacturing devices (or 3D printers) are susceptible to a broad range of attacks.  ...  The chapter outlines the additive and subtractive manufacturing workflows, proposes a framework for analyzing attacks on or using additive manufacturing systems and presents the major threat categories  ...  A range of physical attacks are also possible; manipulations of source materials can have far-reaching impacts on manufactured objects as well as on 3D printers and their manufacturing environments [48  ... 
doi:10.1007/978-3-319-70395-4_2 fatcat:q4uxlpfqifg73hchxqhki5kghm

IoT Network Security: Requirements, Threats, and Countermeasures [article]

Ayyoob Hamza, Hassan Habibi Gharakheili, Vijay Sivaraman
2020 arXiv   pre-print
with a focus on improving the robustness of existing security solutions.  ...  Our first contribution highlights viewpoints on IoT security from the perspective of stakeholders such as manufacturers, service providers, consumers, and authorities.  ...  Data Exfiltration Attack Exfiltration of sensitive data is a major concern in organization networks. These attacks are common in generalpurpose devices.  ... 
arXiv:2008.09339v1 fatcat:bnlkgls3pvbspf7og6nxx5krjq

Smartphone Security and Privacy: A Survey on APTs, Sensor-Based Attacks, Side-Channel Attacks, Google Play Attacks, and Defenses

Zia Muhammad, Zahid Anwar, Abdul Rehman Javed, Bilal Saleem, Sidra Abbas, Thippa Reddy Gadekallu
2023 Technologies  
Nevertheless, there is a rise in APTs, side-channel attacks, sensor-based attacks, and attacks launched through the Google Play Store.  ...  A large number of sophisticated malware attacks as well as advanced persistent threats (APTs) have been launched on smartphone users.  ...  Once malware is installed on a device, it can communicate with a remote server controlled by the attacker, allowing them to collect data.  ... 
doi:10.3390/technologies11030076 fatcat:hvombg4zanbvnmejxw6bknke34

Characteristic Aspects of Additive Manufacturing Security from Security Awareness Perspectives

Lynne M. G. Graves, Joshua Lubell, Wayne King, Mark Yampolskiy
2019 IEEE Access  
In this paper, we analyze the AM Security from three awareness perspectives: exposure to an attack, evaluation of the system, and potential liability for a successful attack.  ...  Our analysis shows that, while there is a certain overlap between AM and SM security, the AM requires a separate and unique perspective and approach undertaken by experts with relevant domain expertise  ...  Any opinions, findings, and conclusions or recommendations expressed in this material are those of the author(s) and do not necessarily reflect the views of the funding agencies.  ... 
doi:10.1109/access.2019.2931738 pmid:32117666 pmcid:PMC7047715 fatcat:hldhhe4pn5gjtn3by2galxzb5q

To Catch a Ratter: Monitoring the Behavior of Amateur DarkComet RAT Operators in the Wild

Brown Farinholt, Mohammad Rezaeirad, Paul Pearce, Hitesh Dharmdasani, Haikuo Yin, Stevens Le Blond, Damon McCoy, Kirill Levchenko
2017 2017 IEEE Symposium on Security and Privacy (SP)  
Remote Access Trojans (RATs) give remote attackers interactive control over a compromised machine.  ...  During these sessions operators frequently attempted to interact with victims via remote desktop, to capture video, audio, and keystrokes, and to exfiltrate files and credentials.  ...  From this, we were able to determine how attackers interact with a victim, including time spent on the machine, user data collected, and so on.  ... 
doi:10.1109/sp.2017.48 dblp:conf/sp/FarinholtRPDYBM17 fatcat:gfztgkoejzbshi3xlbxom324oi

Freedom to Hack

Ido Kilovaty
2017 Social Science Research Network  
This Article rejects this outdated approach in the wake of ubiquitous cyber-attacks, imperfect software, and the emerging Internet of Things ecosystem.  ...  This results in a reality of highly unsecure Internet-of-Things devices and could potentially lead to serious harms to security and privacy.  ...  certain implantable cardiac devices are vulnerable to attacks, which could allow an unauthorized user to control the device and exfiltrate data from it. 189 Surprisingly, medical devices are ridden with  ... 
doi:10.2139/ssrn.3035518 fatcat:ehta5rnuzfdl5o376vt6y2gb6a

Short-Range Audio Channels Security: Survey of Mechanisms, Applications, and Research Challenges

Maurantonio Caprolu, Savio Sciancalepore, Roberto Di Pietro
2020 IEEE Communications Surveys and Tutorials  
To provide a rigorous, scientific, security-oriented review of the field, in this paper we survey and classify methods, applications, and use-cases rooted on short-range audio channels for the provisioning  ...  Short-range audio channels have a few distinguishing characteristics: ease of use, low deployment costs, and easy to tune frequencies, to cite a few.  ...  This publication was partially supported by awards NPRP11S-0109-180242, UREP23-065-1-014, and NPRP X-063-1-014 from the QNRF-Qatar National Research Fund, a member of The Qatar Foundation.  ... 
doi:10.1109/comst.2020.2969030 fatcat:26sskdeh3faaxmyu32iidlxbp4

SoK - Security and Privacy in the Age of Drones: Threats, Challenges, Solution Mechanisms, and Scientific Gaps [article]

Ben Nassi, Asaf Shabtai, Ryusuke Masuoka, Yuval Elovici
2019 arXiv   pre-print
However, drones also pose a significant challenge in terms of security and privacy within society (for both individuals and organizations), and many drone related incidents are reported on a daily basis  ...  These incidents have called attention to the need to detect and disable drones used for malicious purposes and opened up a new area of research and development for academia and industry, with a market  ...  Two studies [54] , [55] showed how to establish a covert channel for data infiltration [54] and exfiltration [55] to/from an organization.  ... 
arXiv:1903.05155v1 fatcat:4mwsyyupbncydn7k3kc33dhzbm

Invisible Finger: Practical Electromagnetic Interference Attack on Touchscreen-based Electronic Devices [article]

Haoqi Shan, Boyi Zhang, Zihao Zhan, Dean Sullivan, Shuo Wang, Yier Jin
2024 arXiv   pre-print
Our attack can inject short-tap, long-press, and omni-directional gestures on touchscreens from a distance larger than the average thickness of common tabletops.  ...  attack in a practical way.  ...  This work is supported by National Institute of Standards and Technology, Intel and National Science Foundation under award number 1818500.  ... 
arXiv:2402.02227v1 fatcat:ktvjgjafbvarjjwcf2sop4coo4

State of the art analysis

N. Raule E. Bongiovanni
2017 Zenodo  
On one side, and probably the most important one, a CHP unit may provide enough electrical power to the kiln to grant its functions even in case of a prolongated blackout on the grid.  ...  The DREAM project proposed to find a cogeneration system that would allow a dual fuel feeding wherein one of them would be a bio‐fuel.  ...  The exfiltration can be avoided by having an authorization system in the intranet rather than in a remote server.  ... 
doi:10.5281/zenodo.2602683 fatcat:x7hlyqxlmfhtbdsexu2i2rejlq

Defense Advanced Research Projects Agency (Darpa) Fiscal Year 2016 Budget Estimates

Department Of Defense Comptroller's Office
2015 Zenodo  
aperture technologies, leveraging alternative launch concepts, and a novel direct-to-user command and data exfiltration architecture.  ...  -Train decoders on a subset of domains and cross-validate on novel scan, record, and stimulate data.  ... 
doi:10.5281/zenodo.1215366 fatcat:cqn5tyfixjanzp5x3tgfkpedri

Defense Advanced Research Projects Agency (Darpa) Fiscal Year 2015 Budget Estimates

Department Of Defense Comptroller's Office
2014 Zenodo  
better data management.  ...  An emphasis in the FY 2015 budget request focuses on research to tailor treatments to patients' unique characteristics, known as "precision medicine."  ...  aperture technologies, leveraging alternative launch concepts, and a novel direct-to-user command and data exfiltration architecture.  ... 
doi:10.5281/zenodo.1215345 fatcat:fjzhmynqjbaafk67q2ckcblj2m

Defense Advanced Research Projects Agency (Darpa) Fiscal Year 2019 Budget Estimates

Department Of Defense Comptroller's Office
2018 Zenodo  
Efforts focus on identified medical gaps in warfighter carerelated to health monitoring and preventing the spread of infectious disease.  ...  and genetic level through cellular,tissue, organ, and whole organism levels.  ...  For example, analysis of an in-memory exploit would require detailed data from a few devices, while analysis of a global botnet attack would require summary data from millions of devices.  ... 
doi:10.5281/zenodo.1215599 fatcat:kxduvg6a5nflhf6iilkwnolobu

Hiding from Whom?

Ksenia Ermoshina, Francesca Musiani
2018 intermédialités  
ACKNOWLEDGEMENTS The authors would like to extend their deepest gratitude to a number of individuals who have provided support and feedback in the production of this report, including (in alphabetical  ...  order) Bram Abramson, Nate Cardozo, Masashi Crete-Nishihata, Ron Deibert, Mickael E.B., Andrew Hilts, Jeffrey Knockel, Adam Molnar, Christopher Prince, Tina Salameh, Amie Stepanovich, and Mari Jing Zhou  ...  reasons for this limitation (e.g., concerns about "remote wipe" features, which can remotely delete data from a device).  ... 
doi:10.7202/1058473ar fatcat:z2x3cfbpczehjgpmlzxjsfkrd4
« Previous Showing results 1 — 15 out of 23 results