REFERENCES

[1] M. U.Farooq, M. Waseem, S. Mazhar, A. Khairi and T. Kamal, "A Review on Internet of Things (IoT)", International Journal of Computer Applications, vol. 113, no. 1, pp. 1-7, 2015.

[2] C. Benson, "The Internet of Things, IoT Systems, and Higher Education", EDUCAUSE Review, no., pp. 34-43, 2016.

[3] Chairman Joint Chiefs of Staff, "Joint Publication 3-12 Cyberspace Operations", Chairman Joint Chiefs of Staff, 2013.

[4] United States Army, "FM 3-38: Cyber Electromagnetic Activities", United States Army, 2014.

[5] "Tempest (codename)", En.wikipedia.org, 2016. [Online]. Available: https://en.wikipedia.org/wiki/Tempest\_\(codename\). [Accessed: 08- Dec- 2016].

[6] L. Constantin, "Hackers found 47 new vulnerabilities in 23 IoT devices at DEF CON", CSO Online, 2016. [Online]. Available: http://www.csoonline.com/article/3119765/security/hackers-found-47-new-vulnerabilities-in-23-iot-devices-at-def-con.html. [Accessed: 08- Dec- 2016].

[7] D. Miessler, "Securing the Internet of Things: Mapping Attack Surface Areas Using the OWASP IoT Top 10", in RSA Conference 2015, San Francisco, 2015.

[8] G. Becker, F. Regazzoni, C. Paar and W. Burleson, "Stealthy dopant-level hardware Trojans: extended version", Journal of Cryptographic Engineering, vol. 4, no. 1, pp. 19-31, 2014.

[9] "18 U.S. Code § 2381 - Treason", Legal Information Institute, 2016. [Online]. Available: https://www.law.cornell.edu/uscode/text/18/2381. [Accessed: 08- Dec- 2016].

[10] Department of Homeland Security, "National Infrastructure Protection Plan 2013: Partnering for Critical Infrastructure Security and Resilience", Department of Homeland Security, 2013.

[11] Department of Homeland Security, "Fiscal Years 2014-2018 Strategic Plan", Department of Homeland Security, 2014.

[12] United States Congress, "National Cybersecurity Protection Act of 2014", United States Congress, 2014.

[13] United States Congress, "Cybersecurity Enhancement Act of 2014", United States Congress, 2014.

[14] United States Congress, "Cybersecurity Information Sharing Act of 2014", United States Congress, 2014.

[15] United States Congress, "Cybersecurity and Infrastructure Protection Agency Act of 2016", United States Congress, 2016.

[16] United States Congress, "State and Local Cyber Protection Act of 2015", United States Congress, 2015.

[17] United States Congress, "Cyber Preparedness Act of 2016", United States Congress, 2016.

[18] United States Congress, "Small Business Cyber Security Improvement Act of 2016", United States Congress, 2016.

[19] National Institute for Science and Technology, "Framework for Improving Critical Infrastructure Cybersecurity", National Institute for Science and Technology, 2013.

[20] J. Grand, "Tools of the Hardware Hacking Trade", Black Hat Webcast, 2014.

[21] T. Sugawara, D. Suzuki, R. Fujii, S. Tawa, R. Hori, M. Shiozaki and T. Fujino, "Reversing stealthy dopant-level circuits", Journal of Cryptographic Engineering, vol. 5, no. 2, pp. 85-94, 2015.

[22] C. Spensky, H. Hu and K. Leach, "LO-PHI: Low-Observable Physical Host Instrumentation for Malware Analysis", Graduate, Massachusetts Institute of Technology-Lincoln Laboratory, 2016.

[23] "Reverse Engineering a Vintage Wireless Keypad with an RTL-SDR", rtl-sdr.com, 2015. [Online]. Available: http://www.rtl-sdr.com/reverse-engineering-a-vintage-wireless-keypad-with-an-rtl-sdr/. [Accessed: 08- Dec- 2016].

[24] "Decoding Public Utility Meters with an RTL-SDR", rtl-sdr.com, 2015. [Online]. Available: http://www.rtl-sdr.com/decoding-public-utility-meters-with-an-rtl-sdr/. [Accessed: 08- Dec- 2016].

[25] "Sniffing and Decoding NRF24L01+ and Bluetooth LE Packets with the RTL-SDR - rtl-sdr.com", rtl-sdr.com, 2014. [Online]. Available: http://www.rtl-sdr.com/sniffing-decoding-nrf24l01-bluetooth-le-packets-rtl-sdr/. [Accessed: 08- Dec- 2016].

[26] "Hak5: Hacking Wireless Doorbells and Software Defined Radio tips", rtl-sdr.com, 2016. [Online]. Available: http://www.rtl-sdr.com/hak5-hacking-wireless-doorbells-and-software-defined-radio-tips/. [Accessed: 08- Dec- 2016].

[27] "Decoding the LoRa IoT Protocol with an RTL-SDR", rtl-sdr.com, 2016. [Online]. Available: http://www.rtl-sdr.com/decoding-the-iot-lora-protocol-with-an-rtl-sdr/. [Accessed: 08- Dec- 2016].

[28] A. Greenberg, "Hackers Remotely Kill a Jeep on the Highway—With Me in It", WIRED, 2015. [Online]. Available: https://www.wired.com/2015/07/hackers-remotely-kill-jeep-highway/. [Accessed: 08- Dec- 2016].

[29] J. Garamone, "Vice Chairman: Military, Nation Need Dialogue About New Technologies," 21 January 2016. [Online].Available: http://www.defense.gov/News/Article/Article/643978/vice-chairman-military-nation-need-dialogue-about-new-technologies.

results matching ""

    No results matching ""