1 |
D.F. Kune, J. Backesy, S.S. Clarkz, D. Kramer, M. Reynolds, K. Fu, Y. Kim, and W. Xu. "Ghost Talk: Mitigating EMI Signal Injection Attacks against Analog Sensors," IEEE Symposium on Security and Privacy, pp. 145-159, May 2013.
|
2 |
M. Krotofil, J. Larsen, and D. Gollmann. "The Process Matters: Ensuring Data Veracity in Cyber-Physical Systems," Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security. pp. 133-144, Apr. 2015.
|
3 |
M. Krotofil, A. Cardenas, J. Larsen, and D. Gollmann, "Vulnerabilities of cyber-physical systems to stale data-Determining the optimal time to launch attacks," International journal of critical infrastructure protection, vol. 7, no. 4, pp. 213-232, Dec. 2014.
DOI
|
4 |
S. Amin, X. Litrico, S. S. Sastry, and A. M. Bayen, "Cyber Security of Water SCADA Systems-Part I: Analysis and Experimentation of Stealthy Deception Attacks", IEEE Transactions on Control Systems Technology, vol. 21, no. 5, pp. 1963-1970, Sep. 2013.
DOI
|
5 |
S. Amin, X. Litrico, S. S. Sastry, and A. M. Bayen, "Cyber Security of Water SCADA Systems-Part II: Attack Detection Using Enhanced Hydrodynamic Model," IEEE Transactions on Control Systems Technology, vol. 21, no. 5, pp. 1679-1693, Sep. 2013.
DOI
|
6 |
Y. Shoukry, P. Martin, Y. Yona, S Diggavi, and M Srivastava. "PyCRA: Physical Challenge-Response Authentication For Active Sensors Under Spoofing Attacks," Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security. pp. 1004-1015, Oct. 2015.
|
7 |
C. Kwon, W. Liu, and I. Hwang, "Security Analysis for Cyber-Physical Systems against Stealthy Deception Attacks", 2013 American Control Conference (ACC), Jun. 2013
|
8 |
Y Mo, S. Weerakkody, and B. Sinopoli. "Physical Authentication of Control Systems: Designing Watermarked Control Inputs to Detect Counterfeit Sensor Outputs," IEEE Control Systems. vol. 35, no. 1, pp. 93-109, Feb. 2015.
DOI
|
9 |
N Falliere, L.O. Murchu, and E. Chien. "W32.Stuxnet Dossier" v1.4, Symantec Security Response, Feb. 2011.
|
10 |
R.M. Lee, M.J. Assante, and T. Conway, "Analysis of the Cyber Attack on the Ukrainian Power Grid", SANS ICS Defense Use Cases, Mar. 2016.
|
11 |
Library of General Functions (LGF) for S7-1200/1500, https://support.industry.siemens.com/cs/document/109479728/library-of-general-functions-(lgf)-for-step-7-(tia-portal)-and-s7-1200-s7-1500?dti=0&lc=en-US
|
12 |
C.M. Ahmed, C. Murguia, and J Ruths. "Model-based Attack Detection Scheme for Smart Water Distribution Networks," Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, pp. 101-113, Apr. 2017
|
13 |
I. Ruchkum, A. Rao, D.D. Niz, S. Chaki, and D. Garlan, "Eliminating Inter-Domain Vulnerabilities in Cyber-Physical Systems: An Analysis Contracts Approach", Proceedings of the First ACM Workshop on Cyber-Physical Systems-Security and/or PrivaCy, pp. 11-22, Oct. 2015
|