Yu et al., 2021 - Google Patents
Security and privacy in the emerging cyber-physical world: A surveyYu et al., 2021
View PDF- Document ID
- 16409528592109690445
- Author
- Yu Z
- Kaplan Z
- Yan Q
- Zhang N
- Publication year
- Publication venue
- IEEE Communications Surveys & Tutorials
External Links
Snippet
With the emergence of low-cost smart and connected IoT devices, the area of cyber-physical security is becoming increasingly important. Past research has demonstrated new threat vectors targeting the transition process between the cyber and physical domains, where the …
- 239000007924 injection 0 abstract description 101
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
- G06F21/563—Static detection by source code analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/566—Dynamic detection, i.e. detection performed at run-time, e.g. emulation, suspicious activities
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/83—Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/77—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/316—User authentication by observing the pattern of computer usage, e.g. typical user behaviour
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Yu et al. | Security and privacy in the emerging cyber-physical world: A survey | |
| Sikder et al. | A survey on sensor-based threats and attacks to smart devices and applications | |
| Sikder et al. | A survey on sensor-based threats to internet-of-things (iot) devices and applications | |
| Giechaskiel et al. | Taxonomy and challenges of out-of-band signal injection attacks and defenses | |
| Yan et al. | Sok: A minimalist approach to formalizing analog sensor security | |
| Yu et al. | A survey on cyber–physical systems security | |
| Li et al. | When CSI meets public WiFi: Inferring your mobile phone password via WiFi signals | |
| Cheng et al. | SonarSnoop: Active acoustic side-channel attacks | |
| Meng et al. | Revealing your mobile password via WiFi signals: Attacks and countermeasures | |
| Maruyama et al. | Tap'n ghost: A compilation of novel attack techniques against smartphone touchscreens | |
| Uluagac et al. | Sensory channel threats to cyber physical systems: A wake-up call | |
| Shrestha et al. | An offensive and defensive exposition of wearable computing | |
| KR20170093256A (en) | Asset accessibility through persistent authentication to mobile devices | |
| KR20180016235A (en) | Authentication techniques including speech and/or lip movement analysis | |
| Ahmed et al. | Noisense print: detecting data integrity attacks on sensor measurements using hardware-based fingerprints | |
| Shrestha et al. | Wave-to-access: Protecting sensitive mobile device services via a hand waving gesture | |
| Gao et al. | Inertiear: Automatic and device-independent imu-based eavesdropping on smartphones | |
| Qi et al. | Construction and mitigation of user-behavior-based covert channels on smartphones | |
| Caprolu et al. | Short-range audio channels security: Survey of mechanisms, applications, and research challenges | |
| Shrestha et al. | Tap-wave-rub: Lightweight human interaction approach to curb emerging smartphone malware | |
| Maatallaoui et al. | The impact of radio frequency (RF) attacks on security and privacy: A comprehensive review | |
| Gao et al. | KITE: Exploring the practical threat from acoustic transduction attacks on inertial sensors | |
| Geng et al. | A survey of wireless sensing security from a role-based view: Victim, weapon, and shield | |
| Ibrahim et al. | A Taxonomy-Based Survey of EM-SCA and Implications for Multi-Robot Systems | |
| Gao et al. | Device-independent smartphone eavesdropping jointly using accelerometer and gyroscope |