2017 IEEE International Symposium on Hardware Oriented Security and Trust (HOST) 2017
DOI: 10.1109/hst.2017.7951804
|View full text |Cite
|
Sign up to set email alerts
|

INFECT: INconspicuous FEC-based Trojan: A hardware attack on an 802.11a/g wireless network

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
12
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 12 publications
(13 citation statements)
references
References 14 publications
0
12
0
Order By: Relevance
“…A covert channel attack or data leakage attack has been addressed in [14], [15], and [22]. Cañedo et al in [22] study utilizing Artificial Neural Networks (ANN) in a gateway to detect anomalies in the data transmitted from the IoT-EDs.…”
Section: Related Workmentioning
confidence: 99%
See 4 more Smart Citations
“…A covert channel attack or data leakage attack has been addressed in [14], [15], and [22]. Cañedo et al in [22] study utilizing Artificial Neural Networks (ANN) in a gateway to detect anomalies in the data transmitted from the IoT-EDs.…”
Section: Related Workmentioning
confidence: 99%
“…By using these features, they prevent some attacks like the man-in-the-middle attack. In [14], Subramani et al introduce a hardware Trojan attack which utilizes the error-correcting capabilities of the Forward Error Correction (FEC) encoder in the baseband circuits of an 802.11a/g transmitter. They argue that FEC provides protection against a noisy channel more than it requires.…”
Section: Related Workmentioning
confidence: 99%
See 3 more Smart Citations