Abstract is missing.
- Firmulti Fuzzer: Discovering Multi-process Vulnerabilities in IoT Devices with Full System Emulation and VMIYung-Tai Cheng, Shin-Ming Cheng. 1-9 [doi]
- Water Risk-Proofed: Risk Assessment in Water DesalinationAlyah Alfageh, Sridhar Adepu, Charalambos Konstantinou. 11-23 [doi]
- Remote Attestation of IoT Devices using Physically Unclonable Functions: Recent Advancements and Open Research ChallengesNiccolò Marastoni, Mariano Ceccato. 25-36 [doi]
- From DDoSim to DDoSimQ: Enhancing DDoS Attack Simulations Through Full System EmulationIslam Obaidat, Zachary Palko, Meera Sridhar. 37 [doi]
- Towards Adversarial Process Control on Inertial Sensor Systems with Physical Feedback Side ChannelsYazhou Tu, Sara Rampazzi, Xiali Hei 0001. 39-51 [doi]
- Brain-Hack: Remotely Injecting False Brain-Waves with RF to Take Control of a Brain-Computer InterfaceAlexandre Armengol-Urpi, Reid Kovacs, Sanjay E. Sarma. 53-66 [doi]
- The Internet of Insecure Cows - A Security Analysis of Wireless Smart Devices Used for Dairy FarmingSamuel Barnes-Thornton, Joseph Gardiner, Awais Rashid. 67-73 [doi]
- SweetCam: an IP Camera HoneypotZetong Zhao, Shreyas Srinivasa, Emmanouil Vasilomanolakis. 75-81 [doi]
- Towards PLC-Specific Binary Analysis Tools: An Investigation of Codesys-Compiled PLC Software ApplicationsHadjer Benkraouda, Anand Agrawal, Dimitrios Tychalas, Marios Sazos, Michail Maniatakos. 83-89 [doi]
- Granular IoT Device Identification Using TF-IDF and Cosine SimilarityAshley Andrews, George Oikonomou, Simon Armour, Paul Thomas, Thomas Cattermole. 91-99 [doi]
- Privacy through Diffusion: A White-listing Approach to Sensor Data AnonymizationXin Yang, Omid Ardakanian. 101-107 [doi]