Up a level |
(2022) Blurtooth: Exploiting cross-transport key derivation in Bluetooth classic and Bluetooth low energy.
(2022) Security Analysis of Vendor Implementations of the OPC UA Protocol for Industrial Control Systems.
(2022) Assessing Model-free Anomaly Detection in Industrial Control Systems Against Generic Concealment Attacks.
(2022) Smooth Transition of Vehicles' Maximum Speed for Lane Detection based on Computer Vision.
(2022) Hiding in Plain Sight? On the Efficacy of Power Side Channel-Based Control Flow Monitoring.
(2022) Microarchitectural Leakage Templates and Their Application to Cache-Based Side Channels.
(2022) Constrained Proximity Attacks on Mobile Targets.