University of Minnesota
Security and Privacy in Computing
index.php

Readings on: non-traditional attacks

Main reading for April 21st:

Stephen Checkoway, Damon McCoy, Brian Kantor, Danny Anderson, Hovav Shacham, Stefan Savage, Karl Koscher, Alexei Czeskis, Franziska Roesner, and Tadayoshi Kohno. “Comprehensive experimental analyses of automotive attack surfaces.” In USENIX Security Symposium, San Francisco, CA, USA, August 2011.
[USENIX]

Main reading for May 7th:

Benjamin Laxton, Kai Wang, and Stefan Savage. “Reconsidering physical key secrecy: Teleduplication via optical decoding”. In ACM Conference on Computer and Communications Security (CCS), pages 469–478, Alexandria, VA, USA, November 2008.
[ACM]

Not selected:

Michael Backes, Markus Dürmuth, Sebastian Gerling, Manfred Pinkal, and Caroline Sporleder. “Acoustic side-channel attacks on printers”. In USENIX Security Symposium, pages 307–322, Washington, DC, USA, August 2010.
[USENIX]

Mario Frank, Tiffany Hwu, Sakshi Jain, Robert Knight, Ivan Martinovic, Prateek Mittal, Daniele Perito, and Dawn Song. “Subliminal probing for private information via EEG-based BCI devices”. arXiv.org Cryptography and Security (cs.CR), 1312.6052, December 2013.
[arXiv]