Detecting data theft using stochastic forensics. digital investigation, vol.8, pp.71-77, 2011. ,
Internet of things (iot): A vision, architectural elements, and future directions, Future generation computer systems, vol.29, issue.7, pp.1645-1660, 2013. ,
Usbee: air-gap covert-channel via electromagnetic emission from usb, Privacy, Security and Trust (PST), 2016 14th Annual Conference on, pp.264-268, 2016. ,
These aren't the droids you're looking for: Retrofitting android to protect data from imperious applications, Proceedings of the 18th ACM conference on Computer and communications security, pp.639-652, 2011. ,
An empirical examination of consumer adoption of internet of things services: Network externalities and concern for information privacy perspectives, Computers in Human Behavior, vol.62, pp.516-527, 2016. ,
Profiling file repository access patterns for identifying data exfiltration activities, Computational Intelligence in Cyber Security (CICS), 2011 IEEE Symposium on, pp.122-128, 2011. ,
Bittersweet adb: Attacks and defenses, Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security, pp.579-584, 2015. ,
Automated verification for secure messaging protocols and their implementations: A symbolic and computational approach, 2nd IEEE European Symposium on Security and Privacy (EuroS&P'17), pp.435-450, 2017. ,
URL : https://hal.archives-ouvertes.fr/hal-01575923
Mactans: Injecting malware into ios devices via malicious chargers, 2013. ,
,
Windows malware attempts to infect android devices, Json web token (jwt), 2014. ,
Popular Internet of Things Forecast of 50 Billion Devices by 2020 Is Outdated, 2016. ,
Detecting data exfiltration by integrating information across layers, Information Reuse and Integration (IRI), pp.309-316, 2013. ,
No free charge theorem: A covert channel via usb charging cable on mobile devices, International Conference on Applied Cryptography and Network Security, pp.83-102, 2017. ,
Defending against malicious usb firmware with goodusb, Proceedings of the 31st Annual Computer Security Applications Conference, pp.261-270, 2015. ,
Exposing security risks for commercial mobile devices, International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, pp.3-21, 2012. ,