Cited By
View all- Li ZMashima DOng WEsiner EKalbarczyk ZChang EQuek TGao DZhou JCardenas A(2024)On Practicality of Using ARM TrustZone Trusted Execution Environment for Securing Programmable Logic ControllersProceedings of the 19th ACM Asia Conference on Computer and Communications Security10.1145/3634737.3645002(947-961)Online publication date: 1-Jul-2024
- Sourav SChen B(2024)Exposing Hidden Attackers in Industrial Control Systems Using Micro-DistortionsIEEE Transactions on Smart Grid10.1109/TSG.2023.330071015:2(2089-2101)Online publication date: Mar-2024
- Chilese MMitev ROrenbach MThorburn RAtamli ASadeghi A(2024)One for All and All for One: GNN-based Control-Flow Attestation for Embedded Devices2024 IEEE Symposium on Security and Privacy (SP)10.1109/SP54263.2024.00251(3346-3364)Online publication date: 19-May-2024
- Show More Cited By