This work was supported by the Ministry of Science and ICT(MSIT);Korea,under the Information Technology Research Center(ITRC)support program(IITP-2022-2018-0-01423);supervised by the Institute for Information&Communications Technology Planning&Evaluation(IITP);by MSIT,Korea under the ITRC support program(IITP-2021-2020-0-01602);supervised by the IITP.
Internet of things(IoT)devices are being increasingly used in numerous areas.However,the low priority on security and various IoT types have made these devices vulnerable to attacks.To prevent this,recent studies have...
Project supported by the National Natural Science Foundation of China(No.62072333);the Research Grants Council of the Hong Kong Special Administrative Region,China(No.GRF 14219422);the Direct Grant for Research,The Chinese University of Hong Kong,China(No.4055151)。
Recently,solid-state drives(SSDs)have been used in a wide range of emerging data processing systems.Essentially,an SSD is a complex embedded system that involves both hardware and software design.For the latter,firmwa...
Internet of things (IoT) devices make up 30%of all network-connected endpoints,introducing vulnerabilities and novel attacks that make many companies as primary targets for cybercriminals.To address this increasing th...
In recent years,with the development of the natural language processing(NLP)technologies,security analyst began to use NLP directly on assembly codes which were disassembled from binary executables in order to examine...
At present,the network security situation is becoming more and more serious.Malicious network attacks such as computer viruses,Trojans and hacker attacks are becoming more and more rampant.National and group network a...
This work was supported by Xie Jialin Fund,Insti-tute of High Energy Physics,Chinese Academy of Sciences.
Background Shanghai HIgh repetition rate XFEL aNd Extreme light facility(SHINE)is a free electron laser facility,which will provide research methods such as high-resolution imaging for many disciplines.The pixel detec...
This work was supported by the National Natural Science Foundation of China under Grant Nos.61572293,61502276 and 61692276;the National Cryptography Development Foundation of China under Grant No.MMJJ20170102;the Major Scientific and Technological Innovation Projects of Shandong Province of China under Grant No.2017CXGC0704;the Natural Science Foundation of Shandong Province of China under Grant No.ZR2016FM22.
In the IEEE S&P 2017,Ronen et al.exploited side-channel power analysis(SCPA)and approximately 5000 power traces to recover the global AES-CCM key that Philip Hue lamps use to decrypt and authenticate new firmware.Base...
This work is funded by the National Key Research and Development Plan(Grant No.2018YFB0803504);the National Natural Science Foundation of China(Nos.62072130,61702223,61702220,61871140,61872420,U1636215);the Guangdong Province Key Area R&D Program of China(No.2019B010137004);the Guangdong Basic and Applied Basic Research Foundation(No.2020A1515010450);Guangdong Province Universities and Colleges Pearl River Scholar Funded Scheme(2019);the Opening Project of Shanghai Trusted Industrial Control Platform(TICPSH202003014-ZC).
The rise of the Internet of Things(IoT)exposes more and more important embedded devices to the network,which poses a serious threat to people’s lives and property.Therefore,ensuring the safety of embedded devices is ...
The pervasive advancement in the field of an autonomous system is significantly influenced by the concept of integrating a large number of devices. The use Internet of Things (IoT) has increased day by day for making ...