Gedare Bloom
Cited by
Cited by
The gem5 simulator: Version 20.0+
J Lowe-Power, AM Ahmad, A Akram, M Alian, R Amslinger, M Andreozzi, ...
arXiv preprint arXiv:2007.03152, 2020
Survey of automotive controller area network intrusion detection systems
C Young, J Zambreno, H Olufowobi, G Bloom
IEEE Design & Test 36 (6), 48-55, 2019
Saiducant: Specification-based automotive intrusion detection using controller area network (can) timing
H Olufowobi, C Young, J Zambreno, G Bloom
IEEE Transactions on Vehicular Technology 69 (2), 1484-1494, 2019
Design patterns for the industrial Internet of Things
G Bloom, B Alsulami, E Nwafor, IC Bertolotti
2018 14th IEEE International Workshop on Factory Communication Systems (WFCS …, 2018
OS support for detecting Trojan circuit attacks
G Bloom, B Narahari, R Simha
2009 IEEE International Workshop on Hardware-Oriented Security and Trust …, 2009
Automotive Intrusion Detection Based on Constant CAN Message Frequencies Across Vehicle Driving Modes
C Young, H Olufowobi, G Bloom, J Zambreno
Proceedings of the ACM Workshop on Automotive Cybersecurity, 9-14, 2019
Providing secure execution environments with a last line of defense against Trojan circuit attacks
G Bloom, B Narahari, R Simha, J Zambreno
computers & security 28 (7), 660-669, 2009
Anomaly Detection Approach Using Adaptive Cumulative Sum Algorithm for Controller Area Network
H Olufowobi, U Ezeobi, E Muhati, G Robinson, C Young, J Zambreno, ...
Proceedings of the ACM Workshop on Automotive Cybersecurity, 25-30, 2019
On the Pitfalls and Vulnerabilities of Schedule Randomization against Schedule-Based Attacks
M Nasri, T Chantem, G Bloom, RM Gerdes
2019 IEEE Real-Time and Embedded Technology and Applications Symposium (RTAS …, 2019
WeepingCAN: A Stealthy CAN Bus-off Attack
G Bloom
Workshop on Automotive and Autonomous Vehicle Security (AutoSec) 2021, 25, 2021
Survey of Interoperability Challenges in the Internet of Vehicles
P Agbaje, A Anjum, A Mitra, E Oseghale, G Bloom, H Olufowobi
IEEE Transactions on Intelligent Transportation Systems 23 (12), 22838-22861, 2022
Shared hardware data structures for hard real-time systems
G Bloom, G Parmer, B Narahari, R Simha
Proceedings of the tenth ACM international conference on Embedded software …, 2012
Connected Cars: Automotive Cybersecurity and Privacy for Smart Cities
H Olufowobi, G Bloom
Smart Cities Cybersecurity and Privacy, 227-240, 2019
Scheduling and thread management with RTEMS
G Bloom, J Sherrill
ACM SIGBED Review 11 (1), 20-25, 2014
Towards a provenance collection framework for Internet of Things devices
E Nwafor, A Campbell, D Hill, G Bloom
2017 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced …, 2017
FPGA SoC architecture and runtime to prevent hardware Trojans from leaking secrets
G Bloom, B Narahari, R Simha, A Namazi, R Levy
2015 IEEE International Symposium on Hardware Oriented Security and Trust …, 2015
Controller Area Network Intrusion Prevention System Leveraging Fault Recovery
H Olufowobi, S Hounsinou, G Bloom
Proceedings of the ACM Workshop on Cyber-Physical Systems Security & Privacy …, 2019
Reverse engineering controller area network messages using unsupervised machine learning
U Ezeobi, H Olufowobi, C Young, J Zambreno, G Bloom
IEEE Consumer Electronics Magazine 11 (1), 50-56, 2020
Anomaly-based Intrusion Detection of IoT Device Sensor Data using Provenance Graphs
E Nwafor, A Campbell, G Bloom
1st International Workshop on Security and Privacy for the Internet-of-Things, 2018
CUPID: A labeled dataset with Pentesting for evaluation of network intrusion detection
H Lawrence, U Ezeobi, O Tauil, J Nosal, O Redwood, Y Zhuang, G Bloom
Journal of Systems Architecture 129, 102621, 2022
The system can't perform the operation now. Try again later.
Articles 1–20