Butterfly attack: Adversarial manipulation of temporal properties of cyber-physical systems

R Mahfouzi, A Aminifar, S Samii… - 2019 IEEE Real …, 2019 - ieeexplore.ieee.org
Increasing internet connectivity poses an existential threat for cyber-physical systems.
Securing these safety-critical systems becomes an important challenge. Cyber-physical …

Optimization of message encryption for real-time applications in embedded systems

A Aminifar, P Eles, Z Peng - IEEE Transactions on Computers, 2017 - ieeexplore.ieee.org
Today, security can no longer be treated as a secondary issue in embedded and cyber-
physical systems. Therefore, one of the main challenges in these domains is the design of …

Dt-ds: Can intrusion detection with decision tree ensembles

J Mehta, G Richard, L Lugosch, D Yu… - ACM Transactions on …, 2023 - dl.acm.org
The controller area network (CAN) protocol, used in many modern vehicles for real-time inter-
device communications, is known to have cybersecurity vulnerabilities, putting passengers …

Multilayer distributed control over 5G networks: Challenges and security threats

N Vreman, M Maggio - Proceedings of the Workshop on Fog Computing …, 2019 - dl.acm.org
Modern control algorithms are frequently implemented in a distributed and decentralized
way. Multiple fog devices communicate using paradigms borrowed from the Internet-of …

Security-Aware Design of Cyber-Physical Systems for Control Applications

R Mahfouzi - 2021 - diva-portal.org
With cyber-physical systems opening to the outside world, security can no longer be
considered a secondary issue. In this work, we focus on security threats to control …