Attacks on Fitness Trackers Revisited: A Case-Study of Unfit Firmware Security.
Jakob RieckPublished in: CoRR (2016)
Keyphrases
- security threats
- security mechanisms
- security problems
- computer security
- security measures
- cyber attacks
- security protocols
- java card
- denial of service attacks
- countermeasures
- information security
- security vulnerabilities
- operating system
- security issues
- security breaches
- computer systems
- chosen plaintext
- security risks
- malicious users
- malicious attacks
- network security
- fault injection
- secure routing
- stream cipher
- evolutionary algorithm
- security flaws
- genetic algorithm
- security policies
- resource constrained
- security requirements
- mean shift
- cryptographic protocols
- insider attacks
- genetic programming
- security management
- intrusion prevention
- smart card
- visual tracking
- access control
- biometric template
- buffer overflow
- intrusion detection
- fitness function
- appearance model
- power consumption
- sensitive data
- intrusion detection and prevention
- watermarking scheme
- attack scenarios
- information leakage
- anomaly detection
- identity theft
- cloud computing
- sql injection
- cyber security
- object tracking
- error correction