Volume 16 (2024)
Volume 15 (2023)
Volume 14 (2022)
Volume 13 (2021)
Volume 12 (2020)
Volume 11 (2019)
Volume 10 (2018)
Volume 9 (2017)
Volume 8 (2016)
Volume 7 (2015)
Volume 6 (2014)
Volume 5 (2013)
Volume 4 (2012)
Volume 3 (2011)
Volume 2 (2010)
Volume 1 (2009)
Side channel parameter characteristics of code injection attacks

E. Aerabi; M. Kaykha; M. Fazeli; A. Patooghy; A. Akbari

Volume 9, Issue 1 , January 2017, , Pages 17-26

https://doi.org/10.22042/isecure.2017.0.0.5

Abstract
  Embedded systems are suggestive targets for code injection attacks in the recent years. Software protection mechanisms, and in general computers, are not usually applicable in embedded systems since they have limited resources like memory and process power. In this paper we investigate side channel characteristics ...  Read More

Unauthenticated event detection in wireless sensor networks using sensors co-coverage

M. Kamarei; A. Patooghy; M. Fazeli

Volume 8, Issue 1 , January 2016, , Pages 61-71

https://doi.org/10.22042/isecure.2016.8.1.4

Abstract
  Wireless Sensor Networks (WSNs) offer inherent packet redundancy since each point within the network area is covered by more than one sensor node. This phenomenon, which is known as sensors co-coverage, is used in this paper to detect unauthenticated events. Unauthenticated event broadcasting in a WSN ...  Read More