Sign in

Attacks on Wireless Coexistence: Exploiting Cross-Technology Performance Features for Inter-Chip Privilege Escalation.

Jiska ClassenFrancesco GringoliMichael HermannMatthias Hollick
Published in: IEEE Symposium on Security and Privacy (2022)
Keyphrases
  • feature vectors
  • case study
  • image features
  • feature set
  • communication technologies
  • feature space
  • high speed
  • low level
  • digital images
  • computer systems
  • intrusion detection
  • security mechanisms
  • remote control