While attacks on information systems have for most prac- tical purposes binary outcomes (information was manipulated/eavesdropped, or not), attacks manipulating the sensor or control signals of Industrial Control Systems (ICS) can be tuned by the attacker to cause a continuous spectrum in damages. Attackers that want to remain undetected can attempt to hide their manipulation of the system by following closely the expected behavior of the system, while injecting just enough false information at each time step to achieve their goals. In this work, we study if physics-based attack detection can limit the impact of such stealthy attacks. We start with a comprehensive review of related work on attack detection schemes in the security...
In the past years we have seen an emerging field of research focusing on using the “physics” of a Cy...
In the past years we have seen an emerging field of research focusing on using the “physics” of a Cy...
In this paper, we discuss the practical implementation of stealthy attacks on industrial control sys...
As more attention is paid to security in the context of control systems and as attacks occur to real...
Industrial Control Systems (ICS) collect information from a variety of sensors throughout the proces...
Doctor of PhilosophyDepartment of Computer ScienceGeorge AmariucaiMany critical infrastructures rely...
Recent incidents have shown that Industrial Control Systems (ICS) are becoming increasingly suscepti...
Doctor of PhilosophyDepartment of Computer ScienceGeorge AmariucaiMany critical infrastructures rely...
Abstract With the integration of the modern industrial control systems (ICS) with the Internet techn...
AbstractWe consider the problem of generating sensor spoofing attacks on feedback controllers. The a...
In this technical note, the trade-off between the attack detectability and the performance degradati...
As more attention is paid to security in the context of control systems and as attacks occur to real...
Thesis: S.M., Massachusetts Institute of Technology, Department of Mechanical Engineering, 2019Catal...
\u3cp\u3eThe term stealthy has come to encompass a variety of techniques that attackers can employ t...
<p>A SCADA system employing the distributed networks of sensors and actuators that interact with the...
In the past years we have seen an emerging field of research focusing on using the “physics” of a Cy...
In the past years we have seen an emerging field of research focusing on using the “physics” of a Cy...
In this paper, we discuss the practical implementation of stealthy attacks on industrial control sys...
As more attention is paid to security in the context of control systems and as attacks occur to real...
Industrial Control Systems (ICS) collect information from a variety of sensors throughout the proces...
Doctor of PhilosophyDepartment of Computer ScienceGeorge AmariucaiMany critical infrastructures rely...
Recent incidents have shown that Industrial Control Systems (ICS) are becoming increasingly suscepti...
Doctor of PhilosophyDepartment of Computer ScienceGeorge AmariucaiMany critical infrastructures rely...
Abstract With the integration of the modern industrial control systems (ICS) with the Internet techn...
AbstractWe consider the problem of generating sensor spoofing attacks on feedback controllers. The a...
In this technical note, the trade-off between the attack detectability and the performance degradati...
As more attention is paid to security in the context of control systems and as attacks occur to real...
Thesis: S.M., Massachusetts Institute of Technology, Department of Mechanical Engineering, 2019Catal...
\u3cp\u3eThe term stealthy has come to encompass a variety of techniques that attackers can employ t...
<p>A SCADA system employing the distributed networks of sensors and actuators that interact with the...
In the past years we have seen an emerging field of research focusing on using the “physics” of a Cy...
In the past years we have seen an emerging field of research focusing on using the “physics” of a Cy...
In this paper, we discuss the practical implementation of stealthy attacks on industrial control sys...