Connor Bolton
Connor Bolton
Verified email at umich.edu - Homepage
Title
Cited by
Cited by
Year
Blue note: How intentional acoustic interference damages availability and integrity in hard disk drives and operating systems
C Bolton, S Rampazzi, C Li, A Kwong, W Xu, K Fu
2018 IEEE Symposium on Security and Privacy (SP), 1048-1062, 2018
172018
Shoulder angel: An open platform for reprogramming wayward wireless sensors
N Tobias, C Bolton, J Hester, L Sitanayah, J Sorber
IEEE Embedded Systems Letters 8 (4), 73-76, 2016
22016
How to curtail oversensing in the home
C Bolton, K Fu, J Hester, J Han
Communications of the ACM 63 (6), 20-24, 2020
2020
SoK: A Minimalist Approach to Formalizing Analog Sensor Security
C Yan, H Shin, C Bolton, W Xu, Y Kim, K Fu
2020 IEEE Symposium on Security and Privacy (SP), 480-495, 2020
2020
Poster: Towards Robust Reprogramming for Wireless Sensors
N Tobias, C Bolton, J Hester, L Sitanayah, J Sorber
Proceedings of the 13th ACM Conference on Embedded Networked Sensor Systems …, 2015
2015
Archimedes Center for Medical Device Security Response to US House Energy and Commerce Committee Request for Information on Supported Lifetimes of Legacy Medical Technology
K Fu, A Kwong, W Xu, K Fu, DJ Slotwiner, F Deering, K Fu, AM Russo, ...
Proceedings of the 40th Annual IEEE Symposium on Security and Privacy 15 …, 0
Miguel Arroyo, Columbia University Musard Balliu, Chalmers University of Technology Iulia Bastys, Chalmers University of Technology Luciano Bello, IBM
B Blanchet, C Bolton, H Chen, K Chen, S Chen, N Christin, S Chung, ...
Poster: Blue Note-How Intentional Acoustic Interference Damages Availability and Integrity in Hard Disk Drives and Operating Systems
C Bolton, S Rampazzi, C Li, A Kwong, W Xu, K Fu
Why Do You Trust Sensors? Analog Cybersecurity Attack Demos
A Kwong, C Bolton, T Trippel, W Xu, K Fu
GTA: GSMem Two-factor Authentication
A Kwong, C Bolton, T Austin
The system can't perform the operation now. Try again later.
Articles 1–10