Cyber-physical Systems Security

Concerns with the security of the cyber-physical systems include the malicious attempts by an adversary to intercept, disrupt, defect or fail cyber-physical systems that may affect a large group of population, an important government agency or an influential business entity by denying availability of services, stealing sensitive data, or causing various types of damages, as well as the security breaches in small scale cyber-physical systems that may affect few individuals or relatively smaller entities.

[1]  Wenke Lee,et al.  Ether: malware analysis via hardware virtualization extensions , 2008, CCS.

[2]  Jonathon T. Giffin,et al.  Impeding Malware Analysis Using Conditional Code Obfuscation , 2008, NDSS.

[3]  Bhavani M. Thuraisingham,et al.  Cyberphysical systems security applied to telesurgical robotics , 2012, Comput. Stand. Interfaces.

[4]  Mohamed Eltoweissy,et al.  Defense as a service cloud for Cyber-Physical Systems , 2011, 7th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom).

[5]  Heejo Lee,et al.  This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination. INVITED PAPER Cyber–Physical Security of a Smart Grid Infrastructure , 2022 .

[6]  Frank Mueller,et al.  Time-based intrusion detection in cyber-physical systems , 2010, ICCPS '10.

[7]  Bhavani M. Thuraisingham Data mining for security applications: Mining concept-drifting data streams to detect peer to peer botnet traffic , 2008, ISI.

[8]  Mohamed G. Gouda,et al.  Diverse Firewall Design , 2008, IEEE Trans. Parallel Distributed Syst..

[9]  Thoshitha T. Gamage,et al.  Confidentiality Preserving Security Properties for Cyber-Physical Systems , 2011, 2011 IEEE 35th Annual Computer Software and Applications Conference.

[10]  S. Shankar Sastry,et al.  Secure Control: Towards Survivable Cyber-Physical Systems , 2008, 2008 The 28th International Conference on Distributed Computing Systems Workshops.

[11]  Thoshitha T. Gamage,et al.  Information flow security in cyber-physical systems , 2011, CSIIRW '11.

[12]  Nabil R. Adam Cyber-physical systems security , 2009, CSIIRW '09.

[13]  Quanyan Zhu,et al.  A hierarchical security architecture for cyber-physical systems , 2011, 2011 4th International Symposium on Resilient Control Systems.

[14]  Xiaoqing Frank Liu,et al.  Security Requirements Analysis, Specification, Prioritization and Policy Development in Cyber-Physical Systems , 2011, 2011 Fifth International Conference on Secure Software Integration and Reliability Improvement - Companion.

[15]  Christopher Krügel,et al.  Exploring Multiple Execution Paths for Malware Analysis , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).

[16]  Yao Zheng,et al.  The Relation of CMM and Software Lifecycle Model , 2007 .

[17]  Deian Stefan,et al.  Data-Provenance Verification For Secure Hosts , 2012, IEEE Transactions on Dependable and Secure Computing.

[18]  Tadayoshi Kohno Security for cyber-physical systems: case studies with medical devices, robots, and automobiles , 2012, WISEC '12.

[19]  Pankaj Gupta,et al.  Algorithms for routing lookups and packet classification , 2000 .

[20]  Hari Balakrishnan,et al.  Not-a-Bot: Improving Service Availability in the Face of Botnet Attacks , 2009, NSDI.

[21]  Bruce M. McMillin,et al.  Analysis of information flow security in cyber-physical systems , 2010, Int. J. Crit. Infrastructure Prot..

[22]  Ing-Ray Chen,et al.  Behavior Rule Based Intrusion Detection for Supporting Secure Medical Cyber Physical Systems , 2012, 2012 21st International Conference on Computer Communications and Networks (ICCCN).

[23]  M. Brownfield,et al.  Wireless sensor network denial of sleep attack , 2005, Proceedings from the Sixth Annual IEEE SMC Information Assurance Workshop.

[24]  Prathiba Reddy Nalabolu Detecting malicious code in sensor network applications using Petri nets , 2007 .

[25]  Felix C. Freiling,et al.  Toward Automated Dynamic Malware Analysis Using CWSandbox , 2007, IEEE Secur. Priv..

[26]  Min Song,et al.  Detecting Compromised Nodes in Wireless Sensor Networks , 2007 .

[27]  Suku Nair,et al.  Cyber-physical security using system-level PUFs , 2011, 2011 7th International Wireless Communications and Mobile Computing Conference.