Zobrazeno 1 - 10
of 103
pro vyhledávání: '"Dyka, Zoya"'
Security especially in the fields of IoT, industrial automation and critical infrastructure is paramount nowadays and a hot research topic. In order to ensure confidence in research results they need to be reproducible. In the past we reported [18] t
Externí odkaz:
http://arxiv.org/abs/2407.06760
Autor:
Petryk, Dmytro, Dyka, Zoya, Krstic, Milos, Bělohoubek, Jan, Fišer, Petr, Steiner, František, Blecha, Tomáš, Langendörfer, Peter, Kabin, Ievgen
Physical side-channel attacks represent a great challenge for today's chip design. Although attacks on CMOS dynamic power represent a class of state-of-the-art attacks, many other effects potentially affect the security of CMOS chips analogously by a
Externí odkaz:
http://arxiv.org/abs/2407.06758
Autor:
Petryk, Dmytro, Dyka, Zoya, Kabin, Ievgen, Breitenreiter, Anselm, Schaeffner, Jan, Krstic, Milos
Security requirements for the Internet of things (IoT), wireless sensor nodes, and other wireless devices connected in a network for data exchange are high. These devices are often subject to lab analysis with the objective to reveal secret hidden in
Externí odkaz:
http://arxiv.org/abs/2407.06751
Towards Secure and Reliable Heterogeneous Real-time Telemetry Communication in Autonomous UAV Swarms
In the era of cutting-edge autonomous systems, Unmanned Aerial Vehicles (UAVs) are becoming an essential part of the solutions for numerous complex challenges. This paper evaluates UAV peer-to-peer telemetry communication, highlighting its security v
Externí odkaz:
http://arxiv.org/abs/2404.07557
The paper presents an experimental study of resilient path planning for con-tinuum robots taking into account the multi-objective optimisation problem. To do this, we used two well-known algorithms, namely Genetic algorithm and A* algorithm, for path
Externí odkaz:
http://arxiv.org/abs/2404.06178
Autor:
Shamilyan, Oxana, Kabin, Ievgen, Dyka, Zoya, Sudakov, Oleksandr, Cherninskyi, Andrii, Brzozowski, Marcin, Langendoerfer, Peter
Publikováno v:
IEEE Access, vol. 11, pp. 60988-61003, 2023
Many technical solutions are bio-inspired. Octopus-inspired robotic arms belong to continuum robots which are used in minimally invasive surgery or for technical system restoration in areas difficult-toaccess. Continuum robot missions are bounded wit
Externí odkaz:
http://arxiv.org/abs/2404.06171
Using sensors as a means to achieve self-awareness and artificial intelligence for decision-making, may be a way to make complex systems self-adaptive, autonomous and resilient. Investigating the combination of distributed artificial intelligence met
Externí odkaz:
http://arxiv.org/abs/2404.06159
Recently autonomous and semi-autonomous Unmanned Aerial Vehicle (UAV) swarms started to receive a lot of research interest and demand from various civil application fields. However, for successful mission execution, UAV swarms require Global navigati
Externí odkaz:
http://arxiv.org/abs/2301.12766
Publikováno v:
Microprocessors and Microsystems, Volume 80, February 2021, 103480
In this paper we discuss the difficulties of mounting successful attack against crypto implementations when essential information is missing. We start with a detailed description of our attack against our own design, to highlight which information is
Externí odkaz:
http://arxiv.org/abs/2201.09631
This paper shows how the Xtensa architecture can be attacked with Return-Oriented-Programming (ROP). The presented techniques include possibilities for both supported Application Binary Interfaces (ABIs). Especially for the windowed ABI a powerful me
Externí odkaz:
http://arxiv.org/abs/2201.06785