Sensors are embedded in security-critical applications from medical devices to nuclear power plants, but their outputs can be spoofed through electromagnetic and other types of signals transmitted by attackers at a distance. To address the lack of a unifying framework for evaluating the effect of such transmissions, we introduce a system and threat model for signal injection attacks. We further define the concepts of existential, selective, and universal security, which address attacker goals from mere disruptions of the sensor readings to precise waveform injections. Moreover, we introduce an algorithm which allows circuit designers to concretely calculate the security level of real systems. Finally, we apply our definitions and algorithm ...
Given the relevance of smartphones for accessing personalized services in smart cities, Continuous A...
Abstract — This paper considers a method of coding the sensor outputs in order to detect stealthy fa...
We apply formal methods to lay and streamline theoretical foundations to reason about Cyber-Physical...
Sensors are embedded in security-critical applications from medical devices to nuclear power plants,...
Recent research has shown that the integrity of sensor measurements can be violated through out-of-b...
Abstract—Electromagnetic interference (EMI) affects cir-cuits by inducing voltages on conductors. An...
Sensor systems are used every time a microcontroller needs to interact with the physical world. They...
An actuator is a device that converts electricity into another form of energy, typically physical mo...
Sensors are a ubiquitous part of modern life, providing crucial data about the physical state of the...
University of Minnesota Ph.D. dissertation. August 2012. Major: Computer Science. Advisor: Yongdae K...
As technology becomes more prevalent, its application to safety and security in critical systems con...
The increasingly tight coupling of cyber (computing/communication) and physical (sensing/actuation)...
The cheap versatility of modern embedded systems is being harnessed to attack sprawling tasks with t...
While attacks on information systems have for most prac- tical purposes binary outcomes (informa...
<p>A SCADA system employing the distributed networks of sensors and actuators that interact with the...
Given the relevance of smartphones for accessing personalized services in smart cities, Continuous A...
Abstract — This paper considers a method of coding the sensor outputs in order to detect stealthy fa...
We apply formal methods to lay and streamline theoretical foundations to reason about Cyber-Physical...
Sensors are embedded in security-critical applications from medical devices to nuclear power plants,...
Recent research has shown that the integrity of sensor measurements can be violated through out-of-b...
Abstract—Electromagnetic interference (EMI) affects cir-cuits by inducing voltages on conductors. An...
Sensor systems are used every time a microcontroller needs to interact with the physical world. They...
An actuator is a device that converts electricity into another form of energy, typically physical mo...
Sensors are a ubiquitous part of modern life, providing crucial data about the physical state of the...
University of Minnesota Ph.D. dissertation. August 2012. Major: Computer Science. Advisor: Yongdae K...
As technology becomes more prevalent, its application to safety and security in critical systems con...
The increasingly tight coupling of cyber (computing/communication) and physical (sensing/actuation)...
The cheap versatility of modern embedded systems is being harnessed to attack sprawling tasks with t...
While attacks on information systems have for most prac- tical purposes binary outcomes (informa...
<p>A SCADA system employing the distributed networks of sensors and actuators that interact with the...
Given the relevance of smartphones for accessing personalized services in smart cities, Continuous A...
Abstract — This paper considers a method of coding the sensor outputs in order to detect stealthy fa...
We apply formal methods to lay and streamline theoretical foundations to reason about Cyber-Physical...