1. bookVolume 14 (2021): Edition 2 (December 2021)
Détails du magazine
License
Format
Magazine
eISSN
2343-8908
Première parution
30 Sep 2018
Périodicité
2 fois par an
Langues
Anglais
Accès libre

A survey for Communication security of the embedded system

Publié en ligne: 21 Jan 2022
Volume & Edition: Volume 14 (2021) - Edition 2 (December 2021)
Pages: 15 - 19
Détails du magazine
License
Format
Magazine
eISSN
2343-8908
Première parution
30 Sep 2018
Périodicité
2 fois par an
Langues
Anglais

Jabeen, Qamar, et al. “A survey: Embedded systems supporting by different operating systems.” arXiv preprint arXiv:1610.07899 (2016). Search in Google Scholar

Al-Fuqaha, Ala, et al. “Internet of things: A survey on enabling technologies, protocols, and applications.” IEEE communications surveys & tutorials 17.4 (2015): 2347-2376.10.1109/COMST.2015.2444095 Search in Google Scholar

MCMILLAN R. How Hackers Attack Cars[EB/OL]. [2010-05-14]. http://www.pcworld.com/article/196320/how_hackers_attack_cars.html. Search in Google Scholar

VAMOSIZHAN R. Embedded System Security[EB/OL]. [2012-10-01]. http://www.altera.com.cn/technology/systemdesign/articles/2012/embedded-security.html. Search in Google Scholar

KIM L W, VILLASENOR J D. Dynamic function replacement for system-on-chip security in the presence of hardware-based attacks[J]. IEEE Transactions on Reliability, 2014, 63(2): 661-675. DOI:10.1109/tr.2014.231695210.1109/TR.2014.2316952 Search in Google Scholar

BIDMESHKI M M, REDDY G R, ZHOU L, et al. Hardware-based Attacks to Compromise the Cryptographic Security of an Election System[C/OL]. [2017-03-02]. DOI:10.1109/iccd.2016.7753274.10.1109/ICCD.2016.7753274 Search in Google Scholar

KIROVSKI D, DRINIĆ M, POTKONJAK M. Enabling Trusted Software Integrity[C/OL]. [2017-06-02]. DOI:10.1145/635508.605409.10.1145/635508.605409 Search in Google Scholar

CHEN Y, VENKATESAN R, CARY M, et al. Oblivious hashing: A stealthy software integrity verification primitive[C]//Information Hiding. Heidelberg: Springer, 2003: 400-414. Search in Google Scholar

SUH G E, O'DONNELL C W, DEVADAS S. AEGIS: A single-chip secure processor[J]. Information Security Technical Report, 2005, 10(2): 63-73. DOI:10.1016/j.istr.2005.05.00210.1016/j.istr.2005.05.002 Search in Google Scholar

OWUSU E, GUAJARDO J, MCCUNE J, et al. OASIS: on achieving a sanctuary for integrity and secrecy on untrusted platforms[C]//Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security. New York: ACM, 2013: 13-24. DOI: 10.1145/2508859.2516678.10.1145/2508859.2516678 Search in Google Scholar

GHOSH A K, SWAMINATHA T M. Software security and privacy risks in mobile e-commerce[J]. Communications of the ACM, 2001, 44(2): 51-57. DOI:10.1145/359205.35922710.1145/359205.359227 Search in Google Scholar

CHEN P, DESMET L, HUYGENS C. A study on advanced persistent threats[C]//IFIP International Conference on Communications and Multimedia Security. Heidelberg: Springer, 2014: 63-72. DOI:10.1007/978-3-662-44885-4_5.10.1007/978-3-662-44885-4_5 Search in Google Scholar

EDGAR C. Ghost Push Malware Can Root Devices and Install Unwanted Apps[EB/OL]. [2015-10-13]. https://www.androidauthority.com/ghost-push-malware-root-apps-fix-648735/. Search in Google Scholar

KOVACS E. BlackEnergy Malware Used in Ukraine Power Grid Attacks[EB/OL]. http://www.securityweek.com/blackenergy-group-uses-destructive-plugin-ukraine-attacks. Search in Google Scholar

LIU Y T, FAN R, TERZIJA V. Power system restoration: A literature review from 2006 to 2016[J]. Journal of Modern Power Systems and Clean Energy, 2016, 4(3): 332-341. DOI:10.1007/s40565-016-0219-210.1007/s40565-016-0219-2 Search in Google Scholar

CVE.CVE-2016-4657[EB/OL].[2016-08-25]. https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2016-4657. Search in Google Scholar

BUGIEL S, DAVI L, DMITRIENKO A, et al. Practical and lightweight domain isolation on Android[C]//Proceedings of the 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices. Chicago: ACM, 2011: 51-62. DOI: 10.1145/2046614.2046624.10.1145/2046614.2046624 Search in Google Scholar

BALDIN D, KERSTAN T. Proteus, a hybrid virtualization platform for embedded systems[C]//Analysis, Architectures and Modelling of Embedded Systems. Berlin: Springer, 2009: 185-194.10.1007/978-3-642-04284-3_17 Search in Google Scholar

S. Raza, S. Duquennoy, T. Chung, D. Yazar, T. Voigt and U. Roedig, “Securing Communication in 6LoWPAN with Compressed IPsec,” in Distributed Computing in Sensor Systems and Workshops (DCOSS), 2011 International Conference On, 2011, pp. 1-8.10.1109/DCOSS.2011.5982177 Search in Google Scholar

Doraswamy, Naganand, and Dan Harkins. IPSec: the new security standard for the Internet, intranets, and virtual private networks. Prentice Hall Professional, 2003. Search in Google Scholar

Hamed, Hazem, Ehab Al-Shaer, and Will Marrero. “Modeling and verification of IPSec and VPN security policies.” 13th IEEE International Conference on Network Protocols (ICNP'05). IEEE, 2005. Search in Google Scholar

S. Raza, S. Duquennoy, J. Höglund, U. Roedig and T. Voigt, “Secure Communication for the Internet of Things—a comparison of link - layer security and IPsec for 6LoWPAN,” Security and Communication Networks, 2012.10.1002/sec.406 Search in Google Scholar

Tan Xinglie, et al. “The Application of PKI Technology in IPSec Series Protocols.” Computer Science 30.5 (2003): 160-163. Search in Google Scholar

Li X.F, Zhao Y.J, Quan C.B. Application of symmetric key encryption algorithm in IPsec protocol [J]. Journal of Electronic Measurement and Instrument, 2014, 28(1): 75-83 Search in Google Scholar

Wang Jian, Wang Haihang, Yang Jian. The remote attestation extension of IPsec protocol [J]. Computer Science, 2011, 38(6): 49-53 Search in Google Scholar

Internet Engineering Task Force (IETF). RFC8446. The transport layer security (tls) protocol version 1.3[S]. USA: Internet Engineering Task Force (IETF), 2018. Search in Google Scholar

Internet Engineering Task Force (IETF). RFC6101. The secure sockets layer (ssl) protocol version3.0[S]. USA: Internet Engineering Task Force (IETF), 2011. Search in Google Scholar

Jia Fangshu. Research on Security Technology Issues in the Application of Ssl Protocol [J]. Digital User, 2018, 36: 18-19 Search in Google Scholar

Z. Z. Wang, Y. Wang. An improvement ssl protocol application research[J]. International Conference on Electronic Mechanical Engineering and Information Technology, 2011, 12(14): 4010-4012 Search in Google Scholar

Wei Junlin, Duan Haixin, Wan Tao. Overview of Security Defects in https/tls Protocol Design and Implementation [J]. Journal of Information Security, 2018, 3(2): 1 Search in Google Scholar

Tang Yi, Wang Zhishuang. Handshake data analysis of personal online banking ssl/tls protocol [J]. Software Guide, 2017, 16(6): 159-162 Search in Google Scholar

Q. Fang, T. Zhe. Qos-aware optimization strategy for security ranking in ssl protocol[J]. IEEE, 2009, 9: 842-847 Search in Google Scholar

Wu Zhijun, Jiang Yuanchun, Niu Fangchao. SSL protocol interactive authentication scheme for wide area information management system [J]. Information Security Research, 2017, 3(8): 718-726 Search in Google Scholar

THAPLIYAL H, VARUN T S S, KUMAR S D. Adiabatic computing based low-power and DPA-resistant lightweight cryptography for IoT devices[C]//VLSI (ISVLSI), 2017 IEEE Computer Society Annual Symposium on. Washington DC: IEEE, 2017: 621-626. DOI:10.1109/isvlsi.2017.115.10.1109/ISVLSI.2017.115 Search in Google Scholar

Wang Kai, Chen Liyun, Wang Zengguang. Refined fingerprint attack method against https protocol website [J]. Journal of Academy of Armored Forces Engineering, 2018, 32(4): 99-104. Search in Google Scholar

Liu Peng, Chen Houwu, Fang Xiao. Research on Network Security Situation Monitoring Mechanism and Model [J]. Information Network Security, 2018, 9: 66-69. Search in Google Scholar

Ma Long, Sun Jianghui, Du Cheng. Research on Network Situation Awareness System Based on Traffic Analysis [J]. Information Technology, 2016, 9: 97-100. Search in Google Scholar

Gao Feng Zhan, Yong Jiang. Research on Network Security Situational Awareness Visualization System [N]. Global Market Information Herald, September 2018. Search in Google Scholar

Zhu Yijie, Yang Yulong, Li Shuai. Research on Network Security Situation Awareness Platform for Big Data Environment [J]. Network Security Technology and Application, 2018, 11: 52-54 Search in Google Scholar

X. F. Liu. Machine learning based ddos attack detection from source side in cloud[C]. 2017 IEEE 4th International Conference on Cyber Security and Cloud Computing, American, 2017, 114-120. Search in Google Scholar

Jiang Yibo, Wang Yuchen, Wang Wanliang. Research on Manet Network Intrusion Detection Performance Evaluation Method Based on Machine Learning [J].Computer Science, 2013, 40: 170-174. Search in Google Scholar

MITCHELL M, TIAN G, WANG Z. Systematic audit of third-party android phones[C]//Proceedings of the 4th ACM Conference on Data and Application Security and Privacy. New York: ACM, 2014: 175-186. DOI:10.1145/2557547.2557557.10.1145/2557547.2557557 Search in Google Scholar

ENCK W, GILBERT P, HAN S, et al. TaintDroid: An information-flow tracking system for realtime privacy monitoring on smartphones[J]. ACM Transactions on Computer Systems (TOCS), 2014, 32(2): 5. DOI:10.1145/249452210.1145/2494522 Search in Google Scholar

EGELE M, KRUEGEL C, KIRDA E, et al. PiOS: Detecting privacy leaks in iOS applications[J]. Network & Distributed System Security Symposium, 2011, 1: 280-291. Search in Google Scholar

ARIAS O, SULLIVAN D, JIN Y. HA2lloc: Hardware-assisted secure allocator[C]//Proceedings of the Hardware and Architectural Support for Security and Privacy. New York: ACM, 2017: 8. DOI:10.1145/3092627.3092635.10.1145/3092627.3092635 Search in Google Scholar

DAVI L, HANREICH M, PAUL D, et al. HAFIX: Hardware-assisted flow integrity extension[C]//Proceedings of the 52nd Annual Design Automation Conference. New York: ACM, 2015: 74. DOI:10.1145/2744769.2744847.10.1145/2744769.2744847 Search in Google Scholar

Articles recommandés par Trend MD

Planifiez votre conférence à distance avec Sciendo