References
- Ravi S, Raghunathan A, Chakradhar S. Tamper resistance mechanisms for secure, embedded systems. In: 17th international conference on VLSI design; Mumbai India. 2004, January.
- Kommerling O, Kuhn MG. Design principles for tamper-resistant smartcard processors. In: Proceedings USENIX Wkshp. on Smartcard Technology (Smartcard ‘99); Chicago, IL, USA. 1999 May. p. 9–20.
- Rankl W, Effing W. “Smart Card Handbook”. John Wiley and Sons; 2010.
- Zhao S, Lee PPC, Lui JCS, et al. Cloud-based push-styled mobile botnets: a case study of exploiting the cloud to device messaging service. In: ACSAC ‘12 Proceedings of the 28th Annual Computer Security Applications Conference; Orlando, Florida, USA. 2012. p. 119–128.
- Ornaghi A, Valleri M. Man in the middle attacks. In: Blackhat Conference Europe; 2003. Available from: https://www.blackhat.com/presentations/bh-europe-03/bh-europe-03-valleri.pdf
- Meyer U, Wetzal S. A man-in-the-middle attack on UMTS”, WiSe’04, Philadelphia, Pennsylvania, USA: Association for Computing Machinery; 2004 October 1.
- Common vulnerabilities and exposures. Available from: https://cve.mitre.org/
- Chien E, Szor P. Blended attack exploits, vulnerabilities, and buffer overflow techniques in computer viruses. Symantec White Paper. Available from: https://www.symantec.com/avcenter/refece/blended.attacks.pdf
- Bar-El H. Introduction to side channel attacks. Discretix white paper. Available from: http://gauss.ececs.uc.edu/Courses/c653/lectures/SideC/intro.pdf
- Kocher P, Jaffe J, Jun B. Introduction to differential power analysis and related attacks. Available from: http://www.cryptography.com/resources/whitepapers/
- Messerges TS, Dabbish EA, Sloan RH. Examining smart-card security under the threat of power analysis attacks. IEEE Trans Comput. 2002 May;51(5):541–552. doi: 10.1109/TC.2002.1004593
- Kocher P, Jaffe J, Jun B. Differential power analysis. Advances In Cryptology – CRYPTO’99, Springer-Verlag Lecture Notes In Computer Science. 1999;1666:388–397.
- Brumley D, Boneh D. Remote timing attacks are practical. In: Proceedings 12th USENIX Security Symp; Washington, DC. 2003 Aug. p. 1–14.
- Kocher PC. Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems. Advances In Cryptology – CRYPTO’96, Springer-Verlag Lecture Notes In Computer Science. 1996;1109:104–113.
- Dhem JF, Koeune F, Leroux PA, et al. A practical implementation of the timing attack. In: Proceedings Third Working Conf. Smart Card Research and Advanced Applications; Amsterdam, Netherlands. 1998 Sept. p. 167–182.
- Boneh D, DeMillo RA, Lipton RJ. On the importance of eliminating errors in cryptographic computations. J Cryptol. 2001;14(2):101–119. doi: 10.1007/s001450010016
- Boneh D, DeMillo RA, Lipton RJ. On the importance of checking cryptographic protocols for faults. In: Walter F, editor. Lecture notes in computer science. Vol. 1233. Berlin: Springer; 1997. pp. 37–51.
- Agrawal D, Archambeault B, Rao JR, et al. The EM side–channel(s). Ches 2002, lncs 2523. 2003;2523:29–45.
- Gandolfi K, Mourte C, Olivier F. Electromagnetic analysis: concrete results. Ches 2001,lncs 2162. 2001;2162:251–261.
- Quisquater JJ, Samyde D. Electromagnetic analysis (EMA): measures and countermeasures for smart cards.”, E-smart 2001. LNCS. 2001;2140:200–210.
- Kuhn MG, Anderson RJ. Soft tempest: hidden data transmission using electromagnetic emanations. Information Hiding 1998, LNCS 1525. 1998;1525:124–142.
- Mulder ED, Buysschaert P, Börs S, et al. “Electromagnetic analysis attack on a FPGA implementation of an elliptic curve cryptosystem”. Leuven, Belgium.January: Katholieke Universiteit Leuven; 2005.
- Massive botnet attack used more than 400,000 IoT devices. 2019, Jul 26. Available from: https://www.bankinfosecurity.com/massive-botnet-attack-used-more-than-400000-iot-devices-a-12841/
- Spamhaus botnet threat report 2019. Available from: https://www.deteque.com/app/uploads/2019/02/Spamhaus-Botnet-Threat-Report-2019.pdf
- Vigilante botnet highlights woeful state of embedded device security. 2015, Oct 5. Available from: https://securityledger.com/2015/10/vigilante-botnet-highlights-woeful-state-of-embedded-device-security/
- Thousands of hacked CCTV devices used in DDoS attacks. 2016, June 28. Available from: http://www.pcworld.com/article/3089346/security/thousands-of-hacked-cctv-devices-used-in-ddos-attacks.html
- Over 100 DDoS botnets built using Linux malware for embedded devices. 2016, June 30. Available from: http://www.csoonline.com/article/3090161/security/over-100-ddos-botnets-built-using-linux-malware-for-embedded-devices.html
- Botnets of embedded devices are brute-forcing telnet ports. 2016, Sep 7. Available from: http://news.softpedia.com/news/botnets-of-embedded-devices-are-trying-to-brute-force-telnet-ports-508050.shtml
- Traynor P, Lin M, Ongtang M, et al. On cellular botnets: measuring the impact of malicious devices on a cellular network core. In: ACM Conference on Computer and Communications Security (CCS); Chicago, IL, United States; 2009 Nov.
- Gartner says worldwide smartphone sales will grow 3% in 2020. Available from: https://www.gartner.com/en/newsroom/press-releases/2020-01-28-gartner-says-worldwide-smartphone-sales-will-grow-3–
- Mobile operating systems’ market share worldwide from January 2012 October 2020. Available from: https://www.statista.com/statistics/272698/global-market-share-held-by-mobile-operating-systems-since-2009/
- Malware threat report: Q2 2020 statistics and trends. Available from: https://www.avira.com/en/blog/malware-threat-report-q2-2020-statistics-and-trends
- 2020 state of malware report. Available from: https://resources.malwarebytes.com/files/2020/02/2020_State-of-Malware-Report.pdf
- Telegram. Available from: https://github.com/DrKLO/Telegram
- Villamarín-Salomón R, Brustoloni JC. Identifying botnets using anomaly detection techniques applied to DNS traffic. In: Consumer Communications and Networking Conference, 2008. CCNC 2008. 5th IEEE Las Vegas, NV, USA. IEEE; 2008. p. 476–481.
- AsSadhan B, Moura JMF, Lapsley D, et al. Detecting botnets using command and control traffic. In: Network Computing and Applications, 2009. NCA 2009. Eighth IEEE International Symposium on Cambridge, MA, USA. IEEE; 2009. p. 156–162.
- Giroire F, Chandrashekar J, Taft N, et al. Exploiting temporal persistence to detect covert botnet channels. In: Engin K, Davide B, Somesh J, editors. Recent advances in intrusion detection. Berlin, Heidelberg: Springer; 2009. p. 326–345.
- Yadav S, Ashwath Kumar Krishna Reddy ALNR, Ranjan S. Detecting algorithmically generated domain-flux attacks with DNS traffic analysis. IEEE/ACM Trans Networking. 2012 Oct;20(5):1663–1677. doi: 10.1109/TNET.2012.2184552
- Antonakakis M, Perdisci R, Nadji Y, et al. From throw-away traffic to bots: detecting the rise of DGA-based malware. In: Proceedings of the 21st USENIX Security Symposium; Bellevue, WA, USA; 2012 Aug. p. 24–40.
- Bilge L, Kirda E, Kruegel C, et al. Exposure: finding malicious domains using passive DNS analysis. In: Proceedings of the Network and Distributed System Security Symposium (NDSS); San Diego, CA, USA; 2011 Feb.
- Geng G, Xu G, Zhang M, et al. The design of SMS based heterogeneous mobile botnet. J Comp. 2012;7(1):235–243. doi: 10.4304/jcp.7.1.235-243