Related publications (37)

A review of the security vulnerabilities and countermeasures in the Internet of Things solutions: A bright future for the Blockchain

Jan Van Herle, Hossein Pourrahmani

The current advances in the Internet of Things (IoT) and the solutions being offered by this technology have accounted IoT among the top ten technologies that will transform the global economy by 2030. IoT is a state-of-the-art paradigm that has developed ...
2023

Climate risk and vulnerability assessment tool

Changing climatic conditions and increase of extreme events induced by climate change have impacts on non- adapted infrastructures, leading to destruction, damage costs and indirect impacts. To adapt infrastructures to those new conditions, there is a need ...
2023

A Deep-Learning Approach to Side-Channel Based CPU Disassembly at Design Time

Mirjana Stojilovic

Side-channel CPU disassembly is a side-channel attack that allows an adversary to recover instructions executed by a processor. Not only does such an attack compromise code confidentiality, it can also reveal critical information on the system’s internals. ...
2022

Electrical-Level Attacks on CPUs, FPGAs, and GPUs: Survey and Implications in the Heterogeneous Era

Mirjana Stojilovic, Dina Gamaleldin Ahmed Shawky Mahmoud

Given the need for efficient high-performance computing, computer architectures combining CPUs, GPUs, and FPGAs are nowadays prevalent. However, each of these components suffers from electrical-level security risks. Moving to heterogeneous systems, with th ...
2022

LIGHTBLUE: Automatic Profile-Aware Debloating of Bluetooth Stacks

Mathias Josef Payer, Daniele Antonioli, Duo Xu

The Bluetooth standard is ubiquitously supported by computers, smartphones, and IoT devices. Due to its complexity, implementations require large codebases, which are prone to security vulnerabilities, such as the recently discovered BlueBorne and BadBluet ...
USENIX ASSOC2021

FuzzGen: Automatic Fuzzer Generation

Mathias Josef Payer

Fuzzing is a testing technique to discover unknown vulnerabilities in software. When applying fuzzing to libraries, the core idea of supplying random input remains unchanged, yet it is non-trivial to achieve good code coverage. Libraries cannot run as stan ...
USENIX ASSOC2020

FirmFuzz: Automated IoT Firmware Introspection and Analysis

Mathias Josef Payer, Hui Peng

While the number of IoT devices grows at an exhilarating pace their security remains stagnant. Imposing secure coding standards across all vendors is infeasible. Testing individual devices allows an analyst to evaluate their security post deployment. Any d ...
ASSOC COMPUTING MACHINERY2019

Vulnerability Assessment of Buildings in Ranau Township: Methodological Design

Pierino Lestuzzi, Noor Sheena Herayani Harith

Structural damage usually happens during earthquake events. This had caused damage of properties and even worse, loss of lives. Usually, the greatest losses were not caused by the quake specifically, but rather because of the fall of the structures. The vu ...
UKM PRESS2019

Recent Advances in Face Presentation Attack Detection

Sébastien Marcel, André Anjos, Amir Mohammadi

The undeniable convenience of face-recognition (FR) based biometrics has made it an attractive tool for access control in various applications, from immigration-control to remote banking. Widespread adopti on of face biometrics, however, depends on the how ...
Springer2019

High anxiety trait: A vulnerable phenotype for stress-induced depression

Maria del Carmen Sandi Perez, Meltem Weger

A great deal of research aims to identify risk factors related to individual vulnerability to develop stress-induced psychopathologies. Here, we summarize evidence that point at anxiety trait as a significant contributor to inter-individual differences in ...
2018

Graph Chatbot

Chat with Graph Search

Ask any question about EPFL courses, lectures, exercises, research, news, etc. or try the example questions below.

DISCLAIMER: The Graph Chatbot is not programmed to provide explicit or categorical answers to your questions. Rather, it transforms your questions into API requests that are distributed across the various IT services officially administered by EPFL. Its purpose is solely to collect and recommend relevant references to content that you can explore to help you answer your questions.