A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2022; you can also visit the original URL.
The file type is application/pdf
.
Filters
Deterministic and Statistical Strategies to Protect ANNs against Fault Injection Attacks
2021
2021 18th International Conference on Privacy, Security and Trust (PST)
Hence, it is very important to protect them against faults and fault attacks. ...
In this work, we propose two fault injection attack detection mechanisms: one based on using output labels for a reference input, and the other on the activations of neurons. ...
ACKNOWLEDGMENT This work was labelled by the EUREKA cluster PENTA and funded by Dutch authorities under grant agreement PENTA-2018e-17004-SunRISE. ...
doi:10.1109/pst52912.2021.9647763
fatcat:gvhtka3vanfubo5ypng4ebbxmm
Cyber-Physical Security of Powertrain Systems in Modern Electric Vehicles: Vulnerabilities, Challenges and Future Visions
2020
IEEE Journal of Emerging and Selected Topics in Power Electronics
The vulnerabilities of EVs are investigated under a variety of cyber-attacks, ranging from energy-efficiencymotivated attacks to safety-motivated attacks. ...
Simulation results, including hardware-in-the-loop (HIL) results, are provided to further analyze the cyber-attack impacts on both converter (device) and vehicle (system) levels. ...
To defend the vehicles against cyber-attacks, [20] and [23] proposed detection and mitigation strategies to reduce collisions for a vehicle platooning system.
A. ...
doi:10.1109/jestpe.2020.3045667
fatcat:c3dzwsbtljeqng42zrjxq4b2ny
A Survey and Perspective on Artificial Intelligence for Security-Aware Electronic Design Automation
[article]
2022
arXiv
pre-print
However, the security concerns and issues related to IC design have been highly overlooked. ...
Artificial intelligence (AI) and machine learning (ML) techniques have been increasingly used in several fields to improve performance and the level of automation. ...
Several protection/detection-based countermeasures have been proposed to mitigate the vulnerabilities of circuits against laser fault injection (LFI) attacks. ...
arXiv:2204.09579v2
fatcat:tebjzerhfvaepbwmka7ipiccxy
A Comprehensive Review of Cybersecurity in Inverter-based Smart Power System amid the Boom of Renewable Energy
2022
IEEE Access
of cyberattacks, state-of-the-art defense strategies including several detection and mitigation techniques, and an overview and comparison of testbed and simulation tools applicable for cyber-physical ...
However, due to the deep information and communication technology (ICT) infrastructure implementation that most inverter-based smart power systems tend to have, they are vulnerable to severe external threats ...
the drafting of this study, also special thanks to Hoang Nhat for his help in designing and drawing beautiful figures for this journal and Le Ngoc Dung for his help in data analysis and classification ...
doi:10.1109/access.2022.3163551
fatcat:adylc72usbenzb6awm3pyqiyri
Intrusion Detection Systems for Intra-vehicle Networks: A Review
2019
IEEE Access
The approach employed is to categorize the reviewed works based on their detection technique and to examine the used feature and feature selection methods, evaluation dataset, attack type, performance ...
However, these provide new attack surfaces that increase the cybersecurity risk to modern vehicles. ...
Vasistha also proposed a timing-based detector to detect changes in the timing behavior of messages using deterministic and statistical approaches. ...
doi:10.1109/access.2019.2894183
fatcat:w2vnreq2n5gsthqusue47zubk4
Technological Perspective of Cyber Secure Smart Inverters Used in Power Distribution System: State of the Art Review
2021
Applied Sciences
Certain cyber threats include physical and cyber attacks, natural phenomena which in turn can lead to grid failure, blackouts, commercial energy losses, privacy and safety issues, etc. ...
The various topologies, IEEE protocols and the control strategy are presented in detail. ...
[15] by means of false data injection (FDI) in power systems based on state estimation. A comprehensive survey reveals the attacks, impacts and defenses against FDI. ...
doi:10.3390/app11188780
fatcat:fftb3hangveedbnpa4fm4gvzie
Soft Computing Techniques for Dependable Cyber-Physical Systems
2019
IEEE Access
This paper is timely due to the increasingly central role that CPSs are beginning to play in modern societies and the need to leverage all the relevant methodologies and tools (such as those provided by ...
reasoning, and rough sets. ...
Jonathan Goh et al. have used LSTMs to predict anomalies and cyber attacks against CPS [139] . Zhenyu Wu et al. have applied LSTMs for fault prediction in CPS [140] . ...
doi:10.1109/access.2019.2920317
fatcat:2fzbaxsknfbylhcky4qxmj2a64
A Survey of Security Challenges, Attacks Taxonomy and Advanced Countermeasures in the Internet of Things
2020
IEEE Access
Code injection attacks may take place in a variety of forms such as HTML script injection and shell injection. ...
The authors in [132] proposed a tool called Gathering Multiple Signatures Approach (GMSA) to defend against code injection attacks and showed an accuracy of 99.45% for the proposed algorithm. ...
doi:10.1109/access.2020.3037359
fatcat:pw4fsmelmjgc5anm7hp537l63e
Two Sides of the Same Coin: Boons and Banes of Machine Learning in Hardware Security
2021
IEEE Journal on Emerging and Selected Topics in Circuits and Systems
As computations are brought nearer to the source of data creation, the attack surface of DNN has also been extended from the input data to the edge devices. ...
On the other hand, ML-based approaches have also been adopted by adversaries to assist side-channel attacks, reverse engineer integrated circuits and break hardware security primitives like Physically ...
fault injection attacks. ...
doi:10.1109/jetcas.2021.3084400
fatcat:c4wdkghpo5fwbhvkekaysnahzm
An intrusion detection and prevention system in cloud computing: A systematic review
2013
Journal of Network and Computer Applications
The distributed and open structure of cloud computing and services becomes an attractive target for potential cyber-attacks by intruders. ...
, and fuzzy theory are leveraged to satisfy these requirements. ...
Acknowledgement The authors wish to thank the Ministry of Higher Education, Malaysia for supporting this research work through the Explora- ...
doi:10.1016/j.jnca.2012.08.007
fatcat:wwch7wh6wfbw7lt5txnfi7ejiq
Resilient Machine Learning for Networked Cyber Physical Systems: A Survey for Machine Learning Security to Securing Machine Learning for CPS
2020
IEEE Communications Surveys and Tutorials
However, in a world of increasing adversaries, it is becoming more difficult to totally prevent CPS from adversarial attacks, hence the need to focus on making CPS resilient. ...
However, harnessing this potential is limited by their critical nature and the far reaching effects of cyber attacks on human, infrastructure and the environment. ...
data injection attacks. ...
doi:10.1109/comst.2020.3036778
fatcat:tyrz76ofxfejha5kwhoptv2hwu
High-Level Penetration of Renewable Energy Sources into Grid Utility: Challenges and Solutions
2020
IEEE Access
ACKNOWLEDGEMENT The authors would like to acknowledge the support provided by the Deanship of Scientific Research (DSR) at King Fahd ...
over current Voltage, power and torque fluctuation reduction Modified controller Converter protection against over voltage Switching among different controllers takes long time Reactive power support ...
However, the control scheme fully depends on fast communication link which may pose threat due to cyber-attack. ...
doi:10.1109/access.2020.3031481
fatcat:xslrbz7kczee7njzetfbascuiu
SymPLFIED: Symbolic program-level fault injection and error detection framework
2008
2008 IEEE International Conference on Dependable Systems and Networks With FTCS and DCC (DSN)
Index T erms-Fault injection, Model checking, Error detection 1 In this paper, we use the term model checking to refer to exhaustive state space enumeration. ...
Our results show that the SymPLFIED framework can be used to uncover hard-to-detect catastrophic cases caused by transient errors in programs that may not be exposed by random fault injection based validation ...
Acknowledgements: This research was funded in part by NSF grant CNS-05-51665 and CNS-04-6351. ...
doi:10.1109/dsn.2008.4630118
dblp:conf/dsn/PattabiramanNKI08
fatcat:6jowadyfmjc47eiaazewyx7nya
SymPLFIED: Symbolic Program-Level Fault Injection and Error Detection Framework
2013
IEEE transactions on computers
Index T erms-Fault injection, Model checking, Error detection 1 In this paper, we use the term model checking to refer to exhaustive state space enumeration. ...
Our results show that the SymPLFIED framework can be used to uncover hard-to-detect catastrophic cases caused by transient errors in programs that may not be exposed by random fault injection based validation ...
Acknowledgements: This research was funded in part by NSF grant CNS-05-51665 and CNS-04-6351. ...
doi:10.1109/tc.2012.219
fatcat:5fggxizw55bkrnow3mhl5wtn3i
A Survey on Home Energy Management
2020
IEEE Access
to another specific criterion. ...
This work aims to survey the most recent literature on home energy management systems, providing an aggregated and unified perspective in the context of residential buildings. ...
(d) Security and privacy -Securing sensitive information and protection against cyber attacks are paramount in the context of HEMSs and smart grid systems. ...
doi:10.1109/access.2019.2963502
fatcat:2xqhdabctnephfs5kkbihopue4
« Previous
Showing results 1 — 15 out of 506 results