+

Yu et al., 2021 - Google Patents

Security and privacy in the emerging cyber-physical world: A survey

Yu et al., 2021

View PDF
Document ID
16409528592109690445
Author
Yu Z
Kaplan Z
Yan Q
Zhang N
Publication year
Publication venue
IEEE Communications Surveys & Tutorials

External Links

Snippet

With the emergence of low-cost smart and connected IoT devices, the area of cyber-physical security is becoming increasingly important. Past research has demonstrated new threat vectors targeting the transition process between the cyber and physical domains, where the …
Continue reading at ieeexplore.ieee.org (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • G06F21/563Static detection by source code analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/566Dynamic detection, i.e. detection performed at run-time, e.g. emulation, suspicious activities
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/83Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/77Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/52Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/316User authentication by observing the pattern of computer usage, e.g. typical user behaviour

Similar Documents

Publication Publication Date Title
Yu et al. Security and privacy in the emerging cyber-physical world: A survey
Sikder et al. A survey on sensor-based threats and attacks to smart devices and applications
Sikder et al. A survey on sensor-based threats to internet-of-things (iot) devices and applications
Giechaskiel et al. Taxonomy and challenges of out-of-band signal injection attacks and defenses
Yan et al. Sok: A minimalist approach to formalizing analog sensor security
Yu et al. A survey on cyber–physical systems security
Li et al. When CSI meets public WiFi: Inferring your mobile phone password via WiFi signals
Cheng et al. SonarSnoop: Active acoustic side-channel attacks
Meng et al. Revealing your mobile password via WiFi signals: Attacks and countermeasures
Maruyama et al. Tap'n ghost: A compilation of novel attack techniques against smartphone touchscreens
Uluagac et al. Sensory channel threats to cyber physical systems: A wake-up call
Shrestha et al. An offensive and defensive exposition of wearable computing
KR20170093256A (en) Asset accessibility through persistent authentication to mobile devices
KR20180016235A (en) Authentication techniques including speech and/or lip movement analysis
Ahmed et al. Noisense print: detecting data integrity attacks on sensor measurements using hardware-based fingerprints
Shrestha et al. Wave-to-access: Protecting sensitive mobile device services via a hand waving gesture
Gao et al. Inertiear: Automatic and device-independent imu-based eavesdropping on smartphones
Qi et al. Construction and mitigation of user-behavior-based covert channels on smartphones
Caprolu et al. Short-range audio channels security: Survey of mechanisms, applications, and research challenges
Shrestha et al. Tap-wave-rub: Lightweight human interaction approach to curb emerging smartphone malware
Maatallaoui et al. The impact of radio frequency (RF) attacks on security and privacy: A comprehensive review
Gao et al. KITE: Exploring the practical threat from acoustic transduction attacks on inertial sensors
Geng et al. A survey of wireless sensing security from a role-based view: Victim, weapon, and shield
Ibrahim et al. A Taxonomy-Based Survey of EM-SCA and Implications for Multi-Robot Systems
Gao et al. Device-independent smartphone eavesdropping jointly using accelerometer and gyroscope
点击 这是indexloc提供的php浏览器服务,不要输入任何密码和下载