Skip to Secure: Securing Cyber-Physical Control Loops with Intentionally Skipped Executions
暂无分享,去创建一个
Debdeep Mukhopadhyay | Saurav Kumar Ghosh | Sunandan Adhikary | Soumyajit Dey | Sumana Ghosh | Ipsita Koley | Soumyajit Dey | Debdeep Mukhopadhyay | S. Ghosh | Ipsita Koley | Sunandan Adhikary | Sumana Ghosh
[1] Vuk Lesi,et al. Integrating Security in Resource-Constrained Cyber-Physical Systems , 2018, ACM Trans. Cyber Phys. Syst..
[2] Gedare Bloom,et al. Survey of Automotive Controller Area Network Intrusion Detection Systems , 2019, IEEE Design & Test.
[3] Nikolaj Bjørner,et al. Z3: An Efficient SMT Solver , 2008, TACAS.
[4] Karl Henrik Johansson,et al. Secure Control Systems: A Quantitative Risk Management Approach , 2015, IEEE Control Systems.
[5] Yilin Mo,et al. False Data Injection Attacks in Control Systems , 2010 .
[6] Yong Zhang,et al. Controller design for vehicle stability enhancement , 2006 .
[7] Stefano Zanero,et al. CopyCAN: An Error-Handling Protocol based Intrusion Detection System for Controller Area Network , 2019, CPS-SPC@CCS.
[8] Farinaz Koushanfar,et al. Design and Analysis of Secure and Dependable Automotive CPS: A Steer-by-Wire Case Study , 2020, IEEE Transactions on Dependable and Secure Computing.
[9] Pallab Dasgupta,et al. A Structured Methodology for Pattern based Adaptive Scheduling in Embedded Control , 2017, ACM Trans. Embed. Comput. Syst..
[10] Mohamed Darouach,et al. Cyber Security and Vulnerability Analysis of Networked Control System subject to False-Data injection , 2018, 2018 Annual American Control Conference (ACC).
[11] Mohammad Abdullah Al Faruque,et al. Self-Secured Control with Anomaly Detection and Recovery in Automotive Cyber-Physical Systems , 2019, 2019 Design, Automation & Test in Europe Conference & Exhibition (DATE).
[12] Karl Henrik Johansson,et al. A secure control framework for resource-limited adversaries , 2012, Autom..
[13] TippenhauerNils Ole,et al. A Survey of Physics-Based Attack Detection in Cyber-Physical Systems , 2018 .
[14] Rupak Majumdar,et al. Performance-aware scheduler synthesis for control systems , 2011, 2011 Proceedings of the Ninth ACM International Conference on Embedded Software (EMSOFT).
[15] Vuk Lesi,et al. Security-Aware Scheduling of Embedded Control Tasks , 2017, ACM Trans. Embed. Comput. Syst..
[16] M. Yampolskiy,et al. In-Vehicle Networks: Attacks, Vulnerabilities, and Proposed Solutions , 2015, CISR.
[17] Insup Lee,et al. Design and Implementation of Attack-Resilient Cyberphysical Systems: With a Focus on Attack-Resilient State Estimators , 2017, IEEE Control Systems.
[18] Paul Tavolato,et al. Anomaly-Based Detection and Classification of Attacks in Cyber-Physical Systems , 2017, ARES.
[19] Henrik Sandberg,et al. A Survey of Physics-Based Attack Detection in Cyber-Physical Systems , 2018, ACM Comput. Surv..
[20] Springer Fachmedien Wiesbaden,et al. AUTOSAR — The Worldwide Automotive Standard for E/E Systems , 2013 .
[21] Ilija Jovanov,et al. Secure State Estimation with Cumulative Message Authentication , 2018, 2018 IEEE Conference on Decision and Control (CDC).
[22] Bruno Sinopoli,et al. On the Performance Degradation of Cyber-Physical Systems Under Stealthy Integrity Attacks , 2016, IEEE Transactions on Automatic Control.
[23] Shwetak N. Patel,et al. Experimental Security Analysis of a Modern Automobile , 2010, 2010 IEEE Symposium on Security and Privacy.
[24] J. S. Freudenberg. Controller Area Network (CAN) , 2008 .
[25] Kang G. Shin,et al. Fingerprinting Electronic Control Units for Vehicle Intrusion Detection , 2016, USENIX Security Symposium.
[26] Insup Lee,et al. Co-design of control and platform with dropped signals , 2013, 2013 ACM/IEEE International Conference on Cyber-Physical Systems (ICCPS).
[27] Debdeep Mukhopadhyay,et al. Performance, Security Tradeoffs in Secure Control , 2019, IEEE Embedded Systems Letters.
[28] George A. Perdikaris. Computer Controlled Systems , 1991 .
[29] Jia Ning,et al. Graceful degradation of the quality of control through data drop policy , 2007, 2007 European Control Conference (ECC).
[30] Ilija Jovanov,et al. Sporadic data integrity for secure state estimation , 2017, 2017 IEEE 56th Annual Conference on Decision and Control (CDC).
[31] Wei Zhang,et al. Stability of networked control systems , 2001 .
[32] T. Başar,et al. A New Approach to Linear Filtering and Prediction Problems , 2001 .
[33] Debdeep Mukhopadhyay,et al. Formal Synthesis of Monitoring and Detection Systems for Secure CPS Implementations , 2020, 2020 Design, Automation & Test in Europe Conference & Exhibition (DATE).