Author of the publication

A methodology for determining the image base of ARM-based industrial control system firmware.

, , , , and . Int. J. Crit. Infrastructure Prot., (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Descrambling data on solid-state disks by reverse-engineering the firmware., , , , , and . Digit. Investig., (2015)A methodology for determining the image base of ARM-based industrial control system firmware., , , , and . Int. J. Crit. Infrastructure Prot., (2017)Determining Image Base of Firmware Files for ARM Devices., , , , , and . IEICE Trans. Inf. Syst., 99-D (2): 351-359 (2016)An Identity-Based Anti-Quantum Privacy-Preserving Blind Authentication in Wireless Sensor Networks., , , , , and . Sensors, 18 (5): 1663 (2018)A VoLTE Encryption Experiment for Android Smartphones., , , and . GSKI (1), volume 848 of Communications in Computer and Information Science, page 115-125. Springer, (2017)A High-Imperceptibility and Histogram-Shifting Data Hiding Scheme for JPEG Images., , , , and . IEEE Access, (2019)Tuner and demodulator design of antenna control system., , , , and . Int. J. Wirel. Mob. Comput., 8 (2): 141-146 (2015)A sensitive network jitter measurement for covert timing channels over interactive traffic., , , , and . Multim. Tools Appl., 78 (3): 3493-3509 (2019)Building packet length covert channel over mobile VoIP traffics., , , , , and . J. Netw. Comput. Appl., (2018)Building covert timing channels by packet rearrangement over mobile networks., , , , , and . Inf. Sci., (2018)