Through the eye of the PLC: semantic security monitoring for industrial processes

D Hadžiosmanović, R Sommer, E Zambon… - Proceedings of the 30th …, 2014 - dl.acm.org
Off-the-shelf intrusion detection systems prove an ill fit for protecting industrial control
systems, as they do not take their process semantics into account. Specifically, current …

A brief survey of security approaches for cyber-physical systems

E Bou-Harb - 2016 8th IFIP International Conference on New …, 2016 - ieeexplore.ieee.org
The security of Cyber-Physical Systems (CPS) has been recently receiving significant
attention from the research community. To this end, this paper sheds the light on a number of …

[PDF][PDF] A Trusted Safety Verifier for Process Controller Code.

SE McLaughlin, SA Zonouz, DJ Pohly, PD McDaniel - NDSS, 2014 - eecs.umich.edu
Attackers can leverage security vulnerabilities in control systems to make physical
processes behave unsafely. Currently, the safe behavior of a control system relies on a …

Real-time attack-recovery for cyber-physical systems using linear approximations

L Zhang, X Chen, F Kong… - 2020 IEEE Real-Time …, 2020 - ieeexplore.ieee.org
Attack detection and recovery are fundamental elements for the operation of safe and
resilient cyber-physical systems. Most of the literature focuses on attack-detection, while …

SABOT: specification-based payload generation for programmable logic controllers

S McLaughlin, P McDaniel - Proceedings of the 2012 ACM conference …, 2012 - dl.acm.org
Programmable Logic Controllers (PLCs) drive the behavior of industrial control systems
according to uploaded programs. It is now known that PLCs are vulnerable to the uploading …

[PDF][PDF] Internet-scale Probing of CPS: Inference, Characterization and Orchestration Analysis.

C Fachkha, E Bou-Harb, A Keliris, ND Memon… - NDSS, 2017 - ndss-symposium.org
Although the security of Cyber-Physical Systems (CPS) has been recently receiving
significant attention from the research community, undoubtedly, there still exists a substantial …

SecureCore: A multicore-based intrusion detection architecture for real-time embedded systems

MK Yoon, S Mohan, J Choi, JE Kim… - 2013 IEEE 19th Real …, 2013 - ieeexplore.ieee.org
Security violations are becoming more common in real-time systems-an area that was
considered to be invulnerable in the past-as evidenced by the recent W32. Stuxnet and …

Real-time attack-recovery for cyber-physical systems using linear-quadratic regulator

L Zhang, P Lu, F Kong, X Chen, O Sokolsky… - ACM Transactions on …, 2021 - dl.acm.org
The increasing autonomy and connectivity in cyber-physical systems (CPS) come with new
security vulnerabilities that are easily exploitable by malicious attackers to spoof a system to …

CPAC: securing critical infrastructure with cyber-physical access control

S Etigowni, D Tian, G Hernandez, S Zonouz… - Proceedings of the 32nd …, 2016 - dl.acm.org
Critical infrastructure such as the power grid has become increasingly complex. The addition
of computing elements to traditional physical components increases complexity and …

Runtime-monitoring for industrial control systems

H Janicke, A Nicholson, S Webber, A Cau - Electronics, 2015 - mdpi.com
Industrial Control Systems (ICS) are widely deployed in nation's critical national
infrastructures such as utilities, transport, banking and health-care. Whilst Supervisory …