In a cyber-physical system, security problems are of vital importance as the failure of such system can have catastrophic effects. Detection methods can be employed to sense the existence of an attack. In a previous study of an attack on the controller while avoiding detection in scalar systems under a certain control assumption, the notion of e-stealthiness was introduced and the strength of e-stealthy attacks was fully characterized. We generalize to the vector system and prove the cases in which we show that the limitations of e-stealthy attack do not extend, in the sense that e-stealthy can inflict damage of arbitrary magnitude to a vector system
Motivated by the attacks on control systems through the cyber (digital) part, we study how signal at...
In this paper, we analyze the vulnerabilities due to integrity cyber attacks named zero-stealthy att...
International audienceStealthy attacks on the sensors and actuators embedded in cyber-physical syste...
In a cyber-physical system, security problems are of vital importance as the failure of such system ...
In a cyber-physical system, security problems are of vital importance as the failure of such system ...
In a cyber-physical system, security problems are of vital importance as the failure of such system ...
In a cyber-physical system, there are potential sources of malicious attacks that can damage the est...
In this article, we study the impact of stealthy attacks on the cyber-physical system (CPS) modeled ...
In this technical note, the trade-off between the attack detectability and the performance degradati...
Ubiquity of embedded computers and network connectivity have made control systems vulnerable to pote...
Security of Cyber-Physical Systems (CPS) against cyber attacks is an important yet challenging probl...
Doctor of PhilosophyDepartment of Computer ScienceGeorge AmariucaiMany critical infrastructures rely...
Doctor of PhilosophyDepartment of Computer ScienceGeorge AmariucaiMany critical infrastructures rely...
Thesis: S.M., Massachusetts Institute of Technology, Department of Mechanical Engineering, 2019Catal...
While attacks on information systems have for most prac- tical purposes binary outcomes (informa...
Motivated by the attacks on control systems through the cyber (digital) part, we study how signal at...
In this paper, we analyze the vulnerabilities due to integrity cyber attacks named zero-stealthy att...
International audienceStealthy attacks on the sensors and actuators embedded in cyber-physical syste...
In a cyber-physical system, security problems are of vital importance as the failure of such system ...
In a cyber-physical system, security problems are of vital importance as the failure of such system ...
In a cyber-physical system, security problems are of vital importance as the failure of such system ...
In a cyber-physical system, there are potential sources of malicious attacks that can damage the est...
In this article, we study the impact of stealthy attacks on the cyber-physical system (CPS) modeled ...
In this technical note, the trade-off between the attack detectability and the performance degradati...
Ubiquity of embedded computers and network connectivity have made control systems vulnerable to pote...
Security of Cyber-Physical Systems (CPS) against cyber attacks is an important yet challenging probl...
Doctor of PhilosophyDepartment of Computer ScienceGeorge AmariucaiMany critical infrastructures rely...
Doctor of PhilosophyDepartment of Computer ScienceGeorge AmariucaiMany critical infrastructures rely...
Thesis: S.M., Massachusetts Institute of Technology, Department of Mechanical Engineering, 2019Catal...
While attacks on information systems have for most prac- tical purposes binary outcomes (informa...
Motivated by the attacks on control systems through the cyber (digital) part, we study how signal at...
In this paper, we analyze the vulnerabilities due to integrity cyber attacks named zero-stealthy att...
International audienceStealthy attacks on the sensors and actuators embedded in cyber-physical syste...