Follow
Gedare Bloom
Title
Cited by
Cited by
Year
The gem5 simulator: Version 20.0+
J Lowe-Power, AM Ahmad, A Akram, M Alian, R Amslinger, M Andreozzi, ...
arXiv preprint arXiv:2007.03152, 2020
3152020
Survey of automotive controller area network intrusion detection systems
C Young, J Zambreno, H Olufowobi, G Bloom
IEEE Design & Test 36 (6), 48-55, 2019
1492019
Saiducant: Specification-based automotive intrusion detection using controller area network (can) timing
H Olufowobi, C Young, J Zambreno, G Bloom
IEEE Transactions on Vehicular Technology 69 (2), 1484-1494, 2019
1392019
Design patterns for the industrial Internet of Things
G Bloom, B Alsulami, E Nwafor, IC Bertolotti
2018 14th IEEE International Workshop on Factory Communication Systems (WFCS …, 2018
1052018
OS support for detecting Trojan circuit attacks
G Bloom, B Narahari, R Simha
2009 IEEE International Workshop on Hardware-Oriented Security and Trust …, 2009
942009
Automotive Intrusion Detection Based on Constant CAN Message Frequencies Across Vehicle Driving Modes
C Young, H Olufowobi, G Bloom, J Zambreno
Proceedings of the ACM Workshop on Automotive Cybersecurity, 9-14, 2019
712019
Anomaly Detection Approach Using Adaptive Cumulative Sum Algorithm for Controller Area Network
H Olufowobi, U Ezeobi, E Muhati, G Robinson, C Young, J Zambreno, ...
Proceedings of the ACM Workshop on Automotive Cybersecurity, 25-30, 2019
582019
Providing secure execution environments with a last line of defense against Trojan circuit attacks
G Bloom, B Narahari, R Simha, J Zambreno
computers & security 28 (7), 660-669, 2009
542009
Survey of Interoperability Challenges in the Internet of Vehicles
P Agbaje, A Anjum, A Mitra, E Oseghale, G Bloom, H Olufowobi
IEEE Transactions on Intelligent Transportation Systems 23 (12), 22838-22861, 2022
512022
WeepingCAN: A Stealthy CAN Bus-off Attack
G Bloom
Workshop on Automotive and Autonomous Vehicle Security (AutoSec) 2021, 25, 2021
392021
On the Pitfalls and Vulnerabilities of Schedule Randomization against Schedule-Based Attacks
M Nasri, T Chantem, G Bloom, RM Gerdes
2019 IEEE Real-Time and Embedded Technology and Applications Symposium (RTAS …, 2019
382019
Scheduling and thread management with RTEMS
G Bloom, J Sherrill
ACM SIGBED Review 11 (1), 20-25, 2014
312014
Shared hardware data structures for hard real-time systems
G Bloom, G Parmer, B Narahari, R Simha
Proceedings of the tenth ACM international conference on Embedded software …, 2012
312012
Connected Cars: Automotive Cybersecurity and Privacy for Smart Cities
H Olufowobi, G Bloom
Smart Cities Cybersecurity and Privacy, 227-240, 2019
302019
Towards a provenance collection framework for Internet of Things devices
E Nwafor, A Campbell, D Hill, G Bloom
2017 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced …, 2017
29*2017
FPGA SoC architecture and runtime to prevent hardware Trojans from leaking secrets
G Bloom, B Narahari, R Simha, A Namazi, R Levy
2015 IEEE International Symposium on Hardware Oriented Security and Trust …, 2015
242015
Controller Area Network Intrusion Prevention System Leveraging Fault Recovery
H Olufowobi, S Hounsinou, G Bloom
Proceedings of the ACM Workshop on Cyber-Physical Systems Security & Privacy …, 2019
232019
Reverse engineering controller area network messages using unsupervised machine learning
U Ezeobi, H Olufowobi, C Young, J Zambreno, G Bloom
IEEE Consumer Electronics Magazine 11 (1), 50-56, 2020
202020
Special Session: The Future of IoT Security
S Mohan, M Asplund, G Bloom, AR Sadeghi, A Ibrahim, N Salajageh, ...
2018 International Conference on Embedded Software (EMSOFT), 1-7, 2018
152018
Anomaly-based Intrusion Detection of IoT Device Sensor Data using Provenance Graphs
E Nwafor, A Campbell, G Bloom
1st International Workshop on Security and Privacy for the Internet-of-Things, 2018
152018
The system can't perform the operation now. Try again later.
Articles 1–20