ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1901.06935
  4. Cited By
Taxonomy and Challenges of Out-of-Band Signal Injection Attacks and
  Defenses

Taxonomy and Challenges of Out-of-Band Signal Injection Attacks and Defenses

21 January 2019
Ilias Giechaskiel
Kasper Bonne Rasmussen
    AAML
ArXivPDFHTML

Papers citing "Taxonomy and Challenges of Out-of-Band Signal Injection Attacks and Defenses"

15 / 15 papers shown
Title
Fault Attacks on Secure Embedded Software: Threats, Design and
  Evaluation
Fault Attacks on Secure Embedded Software: Threats, Design and Evaluation
Bilgiday Yuce
Patrick Schaumont
M. Witteman
36
83
0
23 Mar 2020
Motion Sensor-based Privacy Attack on Smartphones
Motion Sensor-based Privacy Attack on Smartphones
Abhishek Anand
Chen Wang
Jian-Dong Liu
Nitesh Saxena
Yingying Chen
36
26
0
12 Jul 2019
("Oops! Had the silly thing in reverse")---Optical injection attacks in
  through LED status indicators
("Oops! Had the silly thing in reverse")---Optical injection attacks in through LED status indicators
J. Loughry
AAML
26
6
0
30 Jun 2019
Sensor Defense In-Software (SDI):Practical Software Based Detection of
  Spoofing Attacks on Position Sensor
Sensor Defense In-Software (SDI):Practical Software Based Detection of Spoofing Attacks on Position Sensor
Kevin Sam Tharayil
Benyamin Farshteindiker
S. Eyal
N. Hasidim
Roy Hershkovitz
S. Houri
I. Yoffe
M. Oren
Yossef Oren
AAML
23
20
0
12 May 2019
Understanding the Effectiveness of Ultrasonic Microphone Jammer
Understanding the Effectiveness of Ultrasonic Microphone Jammer
Yuxin Chen
Huiying Li
S. Nagels
Zhijing Li
Pedro Lopes
Ben Y. Zhao
Haitao Zheng
29
14
0
17 Apr 2019
Trick or Heat? Manipulating Critical Temperature-Based Control Systems
  Using Rectification Attacks
Trick or Heat? Manipulating Critical Temperature-Based Control Systems Using Rectification Attacks
Yazhou Tu
Sara Rampazzi
Bin Hao
Angel Rodriguez
Kevin Fu
X. Hei
AAML
44
71
0
10 Apr 2019
A Framework for Evaluating Security in the Presence of Signal Injection
  Attacks
A Framework for Evaluating Security in the Presence of Signal Injection Attacks
Ilias Giechaskiel
Youqian Zhang
Kasper Bonne Rasmussen
29
26
0
11 Jan 2019
Signal Jamming Attacks Against Communication-Based Train Control: Attack
  Impact and Countermeasure
Signal Jamming Attacks Against Communication-Based Train Control: Attack Impact and Countermeasure
Subhash Lakshminarayana
Jabir Shabbir Karachiwala
Sang-Yoon Chang
G. Revadigar
Sristi Lakshmi Sravana Kumar
David K. Y. Yau
Yih-Chun Hu
31
22
0
06 Aug 2018
Injected and Delivered: Fabricating Implicit Control over Actuation
  Systems by Spoofing Inertial Sensors
Injected and Delivered: Fabricating Implicit Control over Actuation Systems by Spoofing Inertial Sensors
Yazhou Tu
Zhiqiang Lin
Insup Lee
X. Hei
43
110
0
20 Jun 2018
Acoustic Denial of Service Attacks on HDDs
Acoustic Denial of Service Attacks on HDDs
Mohammad Shahrad
Arsalan Mosenia
Liwei Song
M. Chiang
D. Wentzlaff
Prateek Mittal
26
9
0
21 Dec 2017
DolphinAtack: Inaudible Voice Commands
DolphinAtack: Inaudible Voice Commands
Guoming Zhang
Chen Yan
Xiaoyu Ji
Taimin Zhang
Tianchen Zhang
Wenyuan Xu
AAML
43
694
0
31 Aug 2017
Inaudible Voice Commands
Inaudible Voice Commands
Liwei Song
Prateek Mittal
AAML
31
66
0
24 Aug 2017
SPEAKE(a)R: Turn Speakers to Microphones for Fun and Profit
SPEAKE(a)R: Turn Speakers to Microphones for Fun and Profit
Mordechai Guri
Y. Solewicz
Andrey Daidakulov
Yuval Elovici
43
32
0
22 Nov 2016
Systematic Classification of Side-Channel Attacks: A Case Study for
  Mobile Devices
Systematic Classification of Side-Channel Attacks: A Case Study for Mobile Devices
Raphael Spreitzer
Veelasha Moonsamy
Thomas Korak
Stefan Mangard
AAML
53
214
0
11 Nov 2016
A Pattern-based Survey and Categorization of Network Covert Channel
  Techniques
A Pattern-based Survey and Categorization of Network Covert Channel Techniques
S. Wendzel
S. Zander
Bernhard Fechner
Christian Herdin
41
159
0
11 Jun 2014
1