Share Email Print
cover

PROCEEDINGS VOLUME 10630 • new

Cyber Sensing 2018
Editor(s): Igor V. Ternovskiy; Peter Chin
Format Member Price Non-Member Price
Softcover $60.00 $80.00

Volume Details

Volume Number: 10630
Date Published: 21 June 2018
Softcover: 23 papers (250) pages
ISBN: 9781510617711

Table of Contents
show all abstracts | hide all abstracts
Front Matter: Volume 10630
Author(s): Proceedings of SPIE
Implementations of moving target defense (Conference Presentation)
Author(s): Nathaniel Evans
Show Abstract
The growing threat of cybersecurity attacks in sports
Author(s): Stephanie Jenkins; Nathaniel Evans
Show Abstract
Security tag computation and propagation in OSFA
Author(s): Patrick Jungwirth; Phil Chan; Eric Imsand; Hameed Badawy
Show Abstract
Detailed tracking of program control flow using analog side-channel signals: a promise for IoT malware detection and a threat for many cryptographic implementations
Author(s): Haider Adnan Khan; Monjur Alam; Alenka Zajic; Milos Prvulovic
Show Abstract
Deep learning-based classification and anomaly detection of side-channel signals
Author(s): Xiao Wang; Quan Zhou; Jacob Harer; Gavin Brown; Shangran Qiu; Zhi Dou; John Wang; Alan Hinton; Carlos Aguayo Gonzalez; Peter Chin
Show Abstract
Overhead analysis of the utilization of hardware assisted virtualization for protecting guest operating system applications
Author(s): Michael R. Clark
Show Abstract
Block-level algorithm classification based on RF side-channel
Author(s): James T. Graham; Ronald Riley; Rusty Baldwin; Ashwin Fisher
Show Abstract
Register Hamming distance from side channels
Author(s): Ronald A. Riley; James T. Graham; Rusty O. Baldwin; Ashwin Fisher
Show Abstract
Exploiting side-channel emissions to detect changes in FPGA firmware
Author(s): Ryan M. Fuller; Ronald A. Riley; James T. Graham
Show Abstract
Classification of low-SNR side channels
Author(s): Ronald A. Riley; James T. Graham; Peter D. Swartz; Rusty O. Baldwin; Ashwin Fisher
Show Abstract
Generalization of algorithm recognition in RF side channels between devices
Author(s): Ronald Riley; James T. Graham; Ryan M. Fuller; Rusty O. Baldwin; Ashwin Fisher
Show Abstract
Utilizing electromagnetic emanations for out-of-band detection of unknown attack code in a programmable logic controller
Author(s): Nathaniel Boggs; Jimmy C. Chau; Ang Cui
Show Abstract
Preliminary classification results of RF emission based feature extraction in Internet of Things devices
Author(s): Devin W. Spatz; Devin A. Smarra; Igor V. Ternovskiy
Show Abstract
A graph-theoretic understanding of network-wide implications of local cyber protections for mission assurance
Author(s): Sean Lane; Michael R. Clark; Mengran Xue; Sandip Roy; Sean Warnick
Show Abstract
Lightweight hardware monitoring of IoT devices
Author(s): Andrew Toth; Dan Rapczynski; Jason A. Wampler
Show Abstract
Control flow graph modifications for improved RF-based processor tracking performance
Author(s): Mark Chilenski; George Cybenko; Isaac Dekine; Piyush Kumar; Gil Raz
Show Abstract
A mixed numeric and analytic method for investigating OAM beam scattering in turbid water
Author(s): Austin W. Jantzi; Melanie G. Cockrell; Luke K. Rumbaugh; William D. Jemison
Show Abstract
Comparison of error in two passive phase localization algorithms
Author(s): Charles Berdanier
Show Abstract
Track generation in semi-supervised learning of self-structured algorithm using noisy and sparse, visual, and infrared data
Author(s): Bala Konate; James Graham; Igor Ternovskiy
Show Abstract
Similarity measures for target tracking with aerial images
Author(s): Jenfeng Sam Li; Igor Ternovskiy; James Graham
Show Abstract
Understanding adversarial attack and defense towards deep compressed neural networks
Author(s): Qi Liu; Tao Liu; Wujie Wen
Show Abstract
Development and implementation of VoIP honeypots with wide range of analysis
Author(s): Ladislav Behan; Lukas Kapicak; Jakub Jalowiczor
Show Abstract
Identifying and detecting applications within TLS traffic
Author(s): Michael J. De Lucia; Chase Cotton
Show Abstract
CASPER: an efficient approach to detect anomalous code execution from unintended electronic device emissions
Author(s): Hira Agrawal; Ray Chen; Jeffrey K. Hollingsworth; Christine Hung; Rauf Izmailov; John Koshy; Joe Liberti; Chris Mesterharm; Josh Morman; Thimios Panagos; Marc Pucci; Işil Sebüktekin; Scott Alexander; Simon Tsang
Show Abstract

© SPIE. Terms of Use
Back to Top