Keith Mayes
YOU?
Author Swipe
View article: Return-Oriented Programming on RISC-V
Return-Oriented Programming on RISC-V Open
This paper provides the first analysis on the feasibility of Return-Oriented Programming (ROP) on RISC-V, a new instruction set architecture targeting embedded systems. We show the existence of a new class of gadgets, using several Linear …
View article: Enhanced cyber‐physical security using attack‐resistant cyber nodes and event‐triggered moving target defence
Enhanced cyber‐physical security using attack‐resistant cyber nodes and event‐triggered moving target defence Open
A cyber‐physical authentication strategy to protect power system infrastructure against false data injection (FDI) attacks is outlined. The authors demonstrate that it is feasible to use small, low‐cost, yet highly attack‐resistant securit…
View article: Enhanced Cyber-Physical Security Using Attack-resistant Cyber Nodes and Event-triggered Moving Target Defence
Enhanced Cyber-Physical Security Using Attack-resistant Cyber Nodes and Event-triggered Moving Target Defence Open
This paper outlines a cyber-physical authentication strategy to protect power system infrastructure against false data injection (FDI) attacks. We demonstrate that it is feasible to use small, low-cost, yet highly attack-resistant security…
View article: Return-Oriented Programming on RISC-V
Return-Oriented Programming on RISC-V Open
This paper provides the first analysis on the feasibility of Return-Oriented\nProgramming (ROP) on RISC-V, a new instruction set architecture targeting\nembedded systems. We show the existence of a new class of gadgets, using\nseveral Line…
View article: Security, privacy and safety evaluation of dynamic and static fleets of drones
Security, privacy and safety evaluation of dynamic and static fleets of drones Open
Interconnected everyday objects, either via public or private networks, are gradually becoming reality in modern life -- often referred to as the Internet of Things (IoT) or Cyber-Physical Systems (CPS). One stand-out example are those sys…
View article: Security, privacy and safety evaluation of dynamic and static fleets of drones
Security, privacy and safety evaluation of dynamic and static fleets of drones Open
Inter-connected objects, either via public or private networks are the near future of modern societies. Such inter-connected objects are referred to as Internet-of-Things (IoT) and/or Cyber-Physical Systems (CPS). One example of such a sys…
View article: On the Effectiveness of Ambient Sensing for Detecting NFC Relay Attacks
On the Effectiveness of Ambient Sensing for Detecting NFC Relay Attacks Open
Smartphones with Near-Field Communication (NFC) may emulate contactless smart cards, which has resulted in the deployment of various access control, transportation and payment services, such as Google Pay and Apple Pay. Like contactless ca…
View article: Security and performance comparison of different secure channel protocols for Avionics Wireless Networks
Security and performance comparison of different secure channel protocols for Avionics Wireless Networks Open
The notion of Integrated Modular Avionics (IMA) refers to inter-connected pieces of avionics equipment supported by a wired technology, with stringent reliability and safety requirements. If the inter-connecting wires are physically secure…
View article: Security and Performance Comparison of Different Secure Channel\n Protocols for Avionics Wireless Networks
Security and Performance Comparison of Different Secure Channel\n Protocols for Avionics Wireless Networks Open
The notion of Integrated Modular Avionics (IMA) refers to inter-connected\npieces of avionics equipment supported by a wired technology, with stringent\nreliability and safety requirements. If the inter-connecting wires are\nphysically sec…
View article: An Efficient, Secure and Trusted Channel Protocol for Avionics Wireless Networks
An Efficient, Secure and Trusted Channel Protocol for Avionics Wireless Networks Open
Avionics networks rely on a set of stringent reliability and safety requirements. In existing deployments, these networks are based on a wired technology, which supports these requirements. Furthermore, this technology simplifies the secur…
View article: When Theory and Reality Collide: Demystifying the Effectiveness of Ambient Sensing for NFC-based Proximity Detection by Applying Relay Attack Data
When Theory and Reality Collide: Demystifying the Effectiveness of Ambient Sensing for NFC-based Proximity Detection by Applying Relay Attack Data Open
Over the past decade, smartphones have become the point of convergence for many applications and services. There is a growing trend in which traditional smart-card based services like banking, transport and access control are being provisi…
View article: Empirical Evaluation of Ambient Sensors as Proximity Detection Mechanism for Mobile Payments
Empirical Evaluation of Ambient Sensors as Proximity Detection Mechanism for Mobile Payments Open
Near Field Communication (NFC) has enabled mobile phones to emulate contactless smart cards. Similar to contactless smart cards, they are also susceptible to relay attacks. To counter these, a number of methods have been proposed that rely…