Filters








506 Hits in 6.1 sec

Deterministic and Statistical Strategies to Protect ANNs against Fault Injection Attacks

Troya Cagil Koylu, Cezar Rodolfo Wedig Reinbrecht, Said Hamdioui, Mottaqiallah Taouil
2021 2021 18th International Conference on Privacy, Security and Trust (PST)  
Hence, it is very important to protect them against faults and fault attacks.  ...  In this work, we propose two fault injection attack detection mechanisms: one based on using output labels for a reference input, and the other on the activations of neurons.  ...  ACKNOWLEDGMENT This work was labelled by the EUREKA cluster PENTA and funded by Dutch authorities under grant agreement PENTA-2018e-17004-SunRISE.  ... 
doi:10.1109/pst52912.2021.9647763 fatcat:gvhtka3vanfubo5ypng4ebbxmm

Cyber-Physical Security of Powertrain Systems in Modern Electric Vehicles: Vulnerabilities, Challenges and Future Visions

Jin Ye, Lulu Guo, Bowen Yang, Fangyu Li, Liang Du, Le Guan, Wenzhan Song
2020 IEEE Journal of Emerging and Selected Topics in Power Electronics  
The vulnerabilities of EVs are investigated under a variety of cyber-attacks, ranging from energy-efficiencymotivated attacks to safety-motivated attacks.  ...  Simulation results, including hardware-in-the-loop (HIL) results, are provided to further analyze the cyber-attack impacts on both converter (device) and vehicle (system) levels.  ...  To defend the vehicles against cyber-attacks, [20] and [23] proposed detection and mitigation strategies to reduce collisions for a vehicle platooning system. A.  ... 
doi:10.1109/jestpe.2020.3045667 fatcat:c3dzwsbtljeqng42zrjxq4b2ny

A Survey and Perspective on Artificial Intelligence for Security-Aware Electronic Design Automation [article]

David Selasi Koblah, Rabin Yu Acharya, Daniel Capecci, Olivia P. Dizon-Paradis, Shahin Tajik, Fatemeh Ganji, Damon L. Woodard, Domenic Forte
2022 arXiv   pre-print
However, the security concerns and issues related to IC design have been highly overlooked.  ...  Artificial intelligence (AI) and machine learning (ML) techniques have been increasingly used in several fields to improve performance and the level of automation.  ...  Several protection/detection-based countermeasures have been proposed to mitigate the vulnerabilities of circuits against laser fault injection (LFI) attacks.  ... 
arXiv:2204.09579v2 fatcat:tebjzerhfvaepbwmka7ipiccxy

A Comprehensive Review of Cybersecurity in Inverter-based Smart Power System amid the Boom of Renewable Energy

Nguyen Duc Tuyen, Nguyen Sy Quan, Vo Ba Linh, Tuyen V. Vu, Goro Fujita
2022 IEEE Access  
of cyberattacks, state-of-the-art defense strategies including several detection and mitigation techniques, and an overview and comparison of testbed and simulation tools applicable for cyber-physical  ...  However, due to the deep information and communication technology (ICT) infrastructure implementation that most inverter-based smart power systems tend to have, they are vulnerable to severe external threats  ...  the drafting of this study, also special thanks to Hoang Nhat for his help in designing and drawing beautiful figures for this journal and Le Ngoc Dung for his help in data analysis and classification  ... 
doi:10.1109/access.2022.3163551 fatcat:adylc72usbenzb6awm3pyqiyri

Intrusion Detection Systems for Intra-vehicle Networks: A Review

Omar Y. Al-Jarrah, Carsten Maple, Mehrdad Dianati, David Oxtoby, Alex Mouzakitis
2019 IEEE Access  
The approach employed is to categorize the reviewed works based on their detection technique and to examine the used feature and feature selection methods, evaluation dataset, attack type, performance  ...  However, these provide new attack surfaces that increase the cybersecurity risk to modern vehicles.  ...  Vasistha also proposed a timing-based detector to detect changes in the timing behavior of messages using deterministic and statistical approaches.  ... 
doi:10.1109/access.2019.2894183 fatcat:w2vnreq2n5gsthqusue47zubk4

Technological Perspective of Cyber Secure Smart Inverters Used in Power Distribution System: State of the Art Review

Sumukh Surya, Mohan Krishna Srinivasan, Sheldon Williamson
2021 Applied Sciences  
Certain cyber threats include physical and cyber attacks, natural phenomena which in turn can lead to grid failure, blackouts, commercial energy losses, privacy and safety issues, etc.  ...  The various topologies, IEEE protocols and the control strategy are presented in detail.  ...  [15] by means of false data injection (FDI) in power systems based on state estimation. A comprehensive survey reveals the attacks, impacts and defenses against FDI.  ... 
doi:10.3390/app11188780 fatcat:fftb3hangveedbnpa4fm4gvzie

Soft Computing Techniques for Dependable Cyber-Physical Systems

Muhammad Atif, Siddique Latif, Rizwan Ahmad, Adnan K. Kiani, Junaid Qadir, Adeel Baig, Hisao Ishibuchi, Waseem Abbas
2019 IEEE Access  
This paper is timely due to the increasingly central role that CPSs are beginning to play in modern societies and the need to leverage all the relevant methodologies and tools (such as those provided by  ...  reasoning, and rough sets.  ...  Jonathan Goh et al. have used LSTMs to predict anomalies and cyber attacks against CPS [139] . Zhenyu Wu et al. have applied LSTMs for fault prediction in CPS [140] .  ... 
doi:10.1109/access.2019.2920317 fatcat:2fzbaxsknfbylhcky4qxmj2a64

A Survey of Security Challenges, Attacks Taxonomy and Advanced Countermeasures in the Internet of Things

Shapla Khanam, Ismail Bin Ahmedy, Mohd Yamani Idna Idris, Mohamed Hisham Jaward, Aznul Qalid Bin Md Sabri
2020 IEEE Access  
Code injection attacks may take place in a variety of forms such as HTML script injection and shell injection.  ...  The authors in [132] proposed a tool called Gathering Multiple Signatures Approach (GMSA) to defend against code injection attacks and showed an accuracy of 99.45% for the proposed algorithm.  ... 
doi:10.1109/access.2020.3037359 fatcat:pw4fsmelmjgc5anm7hp537l63e

Two Sides of the Same Coin: Boons and Banes of Machine Learning in Hardware Security

Wenye Liu, Chip-Hong Chang, Xueyang Wang, Chen Liu, Jason Fung, Mohammad Ebrahimabadi, Naghmeh Karimi, Xingyu Meng, Kanad Basu
2021 IEEE Journal on Emerging and Selected Topics in Circuits and Systems  
As computations are brought nearer to the source of data creation, the attack surface of DNN has also been extended from the input data to the edge devices.  ...  On the other hand, ML-based approaches have also been adopted by adversaries to assist side-channel attacks, reverse engineer integrated circuits and break hardware security primitives like Physically  ...  fault injection attacks.  ... 
doi:10.1109/jetcas.2021.3084400 fatcat:c4wdkghpo5fwbhvkekaysnahzm

An intrusion detection and prevention system in cloud computing: A systematic review

Ahmed Patel, Mona Taghavi, Kaveh Bakhtiyari, Joaquim Celestino Júnior
2013 Journal of Network and Computer Applications  
The distributed and open structure of cloud computing and services becomes an attractive target for potential cyber-attacks by intruders.  ...  , and fuzzy theory are leveraged to satisfy these requirements.  ...  Acknowledgement The authors wish to thank the Ministry of Higher Education, Malaysia for supporting this research work through the Explora-  ... 
doi:10.1016/j.jnca.2012.08.007 fatcat:wwch7wh6wfbw7lt5txnfi7ejiq

Resilient Machine Learning for Networked Cyber Physical Systems: A Survey for Machine Learning Security to Securing Machine Learning for CPS

Felix O. Olowononi, Danda B. Rawat, Chunmei Liu
2020 IEEE Communications Surveys and Tutorials  
However, in a world of increasing adversaries, it is becoming more difficult to totally prevent CPS from adversarial attacks, hence the need to focus on making CPS resilient.  ...  However, harnessing this potential is limited by their critical nature and the far reaching effects of cyber attacks on human, infrastructure and the environment.  ...  data injection attacks.  ... 
doi:10.1109/comst.2020.3036778 fatcat:tyrz76ofxfejha5kwhoptv2hwu

High-Level Penetration of Renewable Energy Sources into Grid Utility: Challenges and Solutions

Md. Shafiul Alam, Fahad Saleh Al-Ismail, Aboubakr Salem, M. A. Abido
2020 IEEE Access  
ACKNOWLEDGEMENT The authors would like to acknowledge the support provided by the Deanship of Scientific Research (DSR) at King Fahd  ...  over current Voltage, power and torque fluctuation reduction Modified controller Converter protection against over voltage Switching among different controllers takes long time Reactive power support  ...  However, the control scheme fully depends on fast communication link which may pose threat due to cyber-attack.  ... 
doi:10.1109/access.2020.3031481 fatcat:xslrbz7kczee7njzetfbascuiu

SymPLFIED: Symbolic program-level fault injection and error detection framework

Karthik Pattabiraman, Nithin Nakka, Zbigniew Kalbarczyk, Ravishankar Iyer
2008 2008 IEEE International Conference on Dependable Systems and Networks With FTCS and DCC (DSN)  
Index T erms-Fault injection, Model checking, Error detection 1 In this paper, we use the term model checking to refer to exhaustive state space enumeration.  ...  Our results show that the SymPLFIED framework can be used to uncover hard-to-detect catastrophic cases caused by transient errors in programs that may not be exposed by random fault injection based validation  ...  Acknowledgements: This research was funded in part by NSF grant CNS-05-51665 and CNS-04-6351.  ... 
doi:10.1109/dsn.2008.4630118 dblp:conf/dsn/PattabiramanNKI08 fatcat:6jowadyfmjc47eiaazewyx7nya

SymPLFIED: Symbolic Program-Level Fault Injection and Error Detection Framework

Karthik Pattabiraman, Nithin M. Nakka, Zbigniew T. Kalbarczyk, Ravishankar K. Iyer
2013 IEEE transactions on computers  
Index T erms-Fault injection, Model checking, Error detection 1 In this paper, we use the term model checking to refer to exhaustive state space enumeration.  ...  Our results show that the SymPLFIED framework can be used to uncover hard-to-detect catastrophic cases caused by transient errors in programs that may not be exposed by random fault injection based validation  ...  Acknowledgements: This research was funded in part by NSF grant CNS-05-51665 and CNS-04-6351.  ... 
doi:10.1109/tc.2012.219 fatcat:5fggxizw55bkrnow3mhl5wtn3i

A Survey on Home Energy Management

Joaquim Leitao, Paulo Gil, Bernardete Ribeiro, Alberto Cardoso
2020 IEEE Access  
to another specific criterion.  ...  This work aims to survey the most recent literature on home energy management systems, providing an aggregated and unified perspective in the context of residential buildings.  ...  (d) Security and privacy -Securing sensitive information and protection against cyber attacks are paramount in the context of HEMSs and smart grid systems.  ... 
doi:10.1109/access.2019.2963502 fatcat:2xqhdabctnephfs5kkbihopue4
« Previous Showing results 1 — 15 out of 506 results