Gedare Bloom

Orcid: 0000-0002-5677-7092

Affiliations:
  • University of Colorado Colorado Springs, CA, USA


According to our database1, Gedare Bloom authored at least 58 papers between 2009 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Cimalir: Cross-Platform IoT Malware Clustering using Intermediate Representation.
Proceedings of the 14th IEEE Annual Computing and Communication Workshop and Conference, 2024

L-IDS: A Multi-Layered Approach to Ransomware Detection in IoT.
Proceedings of the 14th IEEE Annual Computing and Communication Workshop and Conference, 2024

Should Smart Homes Be Afraid of Evil Maids? : Identifying Vulnerabilities in IoT Device Firmware.
Proceedings of the 14th IEEE Annual Computing and Communication Workshop and Conference, 2024

Platoon Vulnerability due to Network Topology and Targeted Vehicle.
Proceedings of the 21st IEEE Consumer Communications & Networking Conference, 2024

2023
CANASTA: Controller Area Network Authentication Schedulability Timing Analysis.
IEEE Trans. Veh. Technol., August, 2023

Sidecar-based Path-aware Security for Microservices.
Proceedings of the 28th ACM Symposium on Access Control Models and Technologies, 2023

Work in Progress: Schedulability Analysis of CAN and CAN FD Authentication.
Proceedings of the 29th IEEE Real-Time and Embedded Technology and Applications Symposium, 2023

L-IDS: A lightweight hardware-assisted IDS for IoT systems to detect ransomware attacks.
Proceedings of the 8th ACM/IEEE Conference on Internet of Things Design and Implementation, 2023

Competitive Information Provision Among Internet Routing Nodes.
Proceedings of the American Control Conference, 2023

2022
Survey of Interoperability Challenges in the Internet of Vehicles.
IEEE Trans. Intell. Transp. Syst., 2022

CUPID: A labeled dataset with Pentesting for evaluation of network intrusion detection.
J. Syst. Archit., 2022

Reverse Engineering Controller Area Network Messages Using Unsupervised Machine Learning.
IEEE Consumer Electron. Mag., 2022

Poster: Toward Zero-Trust Path-Aware Access Control.
Proceedings of the SACMAT '22: The 27th ACM Symposium on Access Control Models and Technologies, New York, NY, USA, June 8, 2022

Evaluating Feature Robustness for Windows Malware Family Classification.
Proceedings of the 31st International Conference on Computer Communications and Networks, 2022

Detecting and Classifying Self-Deleting Windows Malware Using Prefetch Files.
Proceedings of the 12th IEEE Annual Computing and Communication Workshop and Conference, 2022

Secure Reboots for Real-Time Cyber-Physical Systems.
Proceedings of the 4th Workshop on CPS & IoT Security and Privacy, 2022

Shining New Light on Useful Features for Network Intrusion Detection Algorithms.
Proceedings of the 19th IEEE Annual Consumer Communications & Networking Conference, 2022

The Tragedy of the Miners.
Proceedings of the 19th IEEE Annual Consumer Communications & Networking Conference, 2022

2021
Precise Cache Profiling for Studying Radiation Effects.
ACM Trans. Embed. Comput. Syst., 2021

Vulnerability of Controller Area Network to Schedule-Based Attacks.
Proceedings of the 42nd IEEE Real-Time Systems Symposium, 2021

Work-in-Progress: Enabling Secure Boot for Real-Time Restart-Based Cyber-Physical Systems.
Proceedings of the 42nd IEEE Real-Time Systems Symposium, 2021

Strong APA scheduling in a real-time operating system: work-in-progress.
Proceedings of the EMSOFT '21: Proceedings of the 2021 International Conference on Embedded Software, Virtual Event, October 8, 2021

2020
SAIDuCANT: Specification-Based Automotive Intrusion Detection Using Controller Area Network (CAN) Timing.
IEEE Trans. Veh. Technol., 2020

The gem5 Simulator: Version 20.0+.
CoRR, 2020

Towards Industrial Security Through Real-time Analytics.
Proceedings of the 23rd IEEE International Symposium on Real-Time Distributed Computing, 2020

Harmonizing ARINC 653 and Realtime POSIX for Conformance to the FACE Technical Standard.
Proceedings of the 23rd IEEE International Symposium on Real-Time Distributed Computing, 2020

2019
Event Notification in CAN-Based Sensor Networks.
IEEE Trans. Ind. Informatics, 2019

Comparison of file systems in RTEMS.
SIGBED Rev., 2019

Survey of Automotive Controller Area Network Intrusion Detection Systems.
IEEE Des. Test, 2019

On the Pitfalls and Vulnerabilities of Schedule Randomization Against Schedule-Based Attacks.
Proceedings of the 25th IEEE Real-Time and Embedded Technology and Applications Symposium, 2019

Automotive Intrusion Detection Based on Constant CAN Message Frequencies Across Vehicle Driving Modes.
Proceedings of the ACM Workshop on Automotive Cybersecurity, 2019

Anomaly Detection Approach Using Adaptive Cumulative Sum Algorithm for Controller Area Network.
Proceedings of the ACM Workshop on Automotive Cybersecurity, 2019

Controller Area Network Intrusion Prevention System Leveraging Fault Recovery.
Proceedings of the ACM Workshop on Cyber-Physical Systems Security & Privacy, 2019

2018
Aligning Deos and RTEMS with the FACE safety base operating system profile.
SIGBED Rev., 2018

Design patterns for the industrial Internet of Things.
Proceedings of the 14th IEEE International Workshop on Factory Communication Systems, 2018

Work-in-Progress: Real-Time Modeling for Intrusion Detection in Automotive Controller Area Network.
Proceedings of the 2018 IEEE Real-Time Systems Symposium, 2018

The future of IoT security: special session.
Proceedings of the International Conference on Embedded Software, 2018

2017
Optimized event notification in CAN through in-frame replies and Bloom filters.
Proceedings of the IEEE 13th International Workshop on Factory Communication Systems, 2017

Towards a provenance collection framework for Internet of Things devices.
Proceedings of the 2017 IEEE SmartWorld, 2017

Work-in-Progress: Reducing Cache Conflicts via Interrupts and BUNDLE Scheduling.
Proceedings of the 2017 IEEE Real-Time and Embedded Technology and Applications Symposium, 2017

Supporting security protocols on CAN-based networks.
Proceedings of the IEEE International Conference on Industrial Technology, 2017

2016
CBufs: efficient, system-wide memory management and sharing.
Proceedings of the 2016 ACM SIGPLAN International Symposium on Memory Management, Santa Barbara, CA, USA, June 14, 2016

Verifying Nested Lock Priority Inheritance in RTEMS with Java Pathfinder.
Proceedings of the Formal Methods and Software Engineering, 2016

n-Modular Redundant Real-Time Middleware: Design and Implementation.
Proceedings of the Embedded Operating Systems Workshop co-located with the Embedded Systems Week (ESWEEK 2016), 2016

LockDown: an operating system for achieving service continuity by quarantining principals.
Proceedings of the 9th European Workshop on System Security, 2016

SuperGlue: IDL-Based, System-Level Fault Tolerance for Embedded Systems.
Proceedings of the 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2016

2015
FPGA SoC architecture and runtime to prevent hardware Trojans from leaking secrets.
Proceedings of the IEEE International Symposium on Hardware Oriented Security and Trust, 2015

2014
Scheduling and thread management with RTEMS.
SIGBED Rev., 2014

Hardware-enhanced distributed access enforcement for role-based access control.
Proceedings of the 19th ACM Symposium on Access Control Models and Technologies, 2014

2013
PyLOM: a language and run-time system for planning applications.
Proceedings of the SPLASH'13, 2013

Hardware and software support for fine-grained memory access control and encapsulation in C++.
Proceedings of the SPLASH'13, 2013

2012
Shared hardware data structures for hard real-time systems.
Proceedings of the 12th International Conference on Embedded Software, 2012

No Principal Too Small: Memory Access Control for Fine-Grained Protection Domains.
Proceedings of the 15th Euromicro Conference on Digital System Design, 2012

2011
Automation for Creating and Configuring Security Manifests for Hardware Containers.
Proceedings of the 4th Symposium on Configuration Analytics and Automation, SafeConfig 2011, Arlington, VA, USA, October 31, 2011

2009
Providing secure execution environments with a last line of defense against Trojan circuit attacks.
Comput. Secur., 2009

OS Support for Detecting Trojan Circuit Attacks.
Proceedings of the IEEE International Workshop on Hardware-Oriented Security and Trust, 2009

Hardware Containers for Software Components: A Trusted Platform for COTS-Based Systems.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009

Hardware-enforced fine-grained isolation of untrusted code.
Proceedings of the First ACM Workshop on Secure Execution of Untrusted Code, 2009


  Loading...