Filters








1,266 Hits in 5.7 sec

Diversity-By-Design for Dependable and Secure Cyber-Physical Systems: A Survey [article]

Qisheng Zhang, Abdullah Zubair Mohammed, Zelin Wan, Jin-Hee Cho, Terrence J. Moore
2020 arXiv   pre-print
on developing secure and dependable cyber-physical systems (CPSs) using diversity as a system design feature.  ...  The concept of diversity-by-design emerged in the 1980's and, since then, diversity-based system design research has been explored to build more secure and dependable systems.  ...  We discuss the design principle of what-to-diversify for three different systems, including cyber, physical, and cyber-physical systems.  ... 
arXiv:2007.08688v1 fatcat:q5umyoql4nfbfhbjlbdhavu72q

A Tutorial on Moving Target Defense Approaches Within Automotive Cyber-Physical Systems

Bradley Potteiger, Zhenkai Zhang, Long Cheng, Xenofon Koutsoukos
2022 Frontiers in Future Transportation  
With the rapid adoption of distributed automotive Cyber-Physical Systems (CPS) ranging from self driving cars, to connected transportation infrastructure, it is becoming more apparent that third party  ...  Moving Target Defenses (MTD) have become a popular and emerging defense strategy for the protection of traditional information technology systems.  ...  Instruction Set Randomization Many techniques have been proposed to defuse code injection attacks including stackguards, memory management unit access control lists, control flow integrity, and masking  ... 
doi:10.3389/ffutr.2021.792573 fatcat:trgep6iqovgu3jfj6f6m2d5joi

VERCASM-CPS: Vulnerability Analysis and Cyber Risk Assessment for Cyber-Physical Systems

Bradley Northern, Trey Burks, Marlana Hatcher, Michael Rogers, Denis Ulybyshev
2021 Information  
Since Cyber-Physical Systems (CPS) are widely used in critical infrastructures, it is essential to protect their assets from cyber attacks to increase the level of security, safety and trustworthiness,  ...  In this paper, we will compare cyber risk scores for different CPS configurations and show that the Windows® 10 build 20H2 operating system is more secure than Linux Ubuntu® 20.04, while Red Hat® Enterprise  ...  Acknowledgments: We thank the Department of Computer Science and Cyber Education Research and Outreach Center (CEROC) at Tennessee Technological University for providing funds and resources for this project  ... 
doi:10.3390/info12100408 fatcat:lzxq32uh3vbtbjpvq3msw6eqty

Hardware and Security [chapter]

Gedare Bloom, Eugen Leontie, Bhagirath Narahari, Rahul Simha
2012 Handbook on Securing Cyber-Physical Critical Infrastructure  
So, hardware security concerns the entire lifespan of a cyber-physical system, from before design until after retirement.  ...  Despite the presence of malicious attacks, cyber-physical systems should be resilient and continue to operate correctly.  ... 
doi:10.1016/b978-0-12-415815-3.00012-1 fatcat:usk6j5webjdytjmtjublkukjve

Reconfiguration-Based VLSI Design for Security

Bao Liu, Brandon Wang
2015 IEEE Journal on Emerging and Selected Topics in Circuits and Systems  
Reconfigurable computing is a critical technology for achieving nanoelectronic systems of yield and reliability.  ...  We further present reconfigurable reversible computing-based cryptography, and a generic reconfiguration-based VLSI design-for-security methodology.  ...  ACKNOWLEDGMENTS We thank the reviewers and Dr. Ramesh Karri and Jeyavijayan Rajendran at NYU-Poly for their valuable comments.  ... 
doi:10.1109/jetcas.2014.2372431 fatcat:v2rsd2c2rjacbd2y7vfn7unwt4

Competency Pool and the competency model for cyber and information security professionals

Daniel Bendler
2021 Zenodo  
The extracted competencies of the competency model analysis and the competency model for cyber and information security professionals are presented.  ...  Physical Security Physical Security Controls The cyber security professional is able to apply various physical security controls to mitigate risk and protect organizations, physical facilities, data, people  ...  Cyber-Physical Systems & IoT The cyber security professional knows and understands the specific cyber security challenges associated with cyber-physical systems and IoT.  ... 
doi:10.5281/zenodo.4765646 fatcat:ok3zjkw2ive2tlrpl3btxqr6l4

Competency Pool and the competency model for cyber and information security professionals

Daniel Bendler
2021 Zenodo  
The extracted competencies of the competency model analysis and the competency model for cyber and information security professionals are presented.  ...  Physical Security Physical Security Controls The cyber security professional is able to apply various physical security controls to mitigate risk and protect organizations, physical facilities, data, people  ...  Cyber-Physical Systems & IoT The cyber security professional knows and understands the specific cyber security challenges associated with cyber-physical systems and IoT.  ... 
doi:10.5281/zenodo.4765645 fatcat:ge7mwxfwpbfk3lifnyoc7aixzq

Intrusion Detection Systems for Networked Unmanned Aerial Vehicles: A Survey [article]

Gaurav Choudhary, Vishal Sharma, Ilsun You, Kangbin Yim, Ing-Ray Chen, Jin-Hee Cho
2018 arXiv   pre-print
the goals of both security and performance.  ...  Networked UAVs are vulnerable to malicious attacks over open-air radio space and accordingly, intrusion detection systems (IDSs) have been naturally derived to deal with the vulnerabilities and/or attacks  ...  Lastly, we discussed key research challenges that should be considered for future research plans, aiming to build an affordable, secure cyber-physical UAV-IDS system.  ... 
arXiv:1807.00435v1 fatcat:vvdkeimrzfejjmwmqvbq6fnd2q

Remote dynamic partial reconfiguration: A threat to Internet-of-Things and embedded security applications

Anju P. Johnson, Sikhar Patranabis, Rajat Subhra Chakraborty, Debdeep Mukhopadhyay
2017 Microprocessors and microsystems  
The advent of the Internet of Things has motivated the use of Field Programmable Gate Array (FPGA) devices with Dynamic Partial Reconfiguration (DPR) capabilities for dynamic non-invasive modifications  ...  security applications -namely, a software implementation of a cryptographic algorithm and a cash dispensing scheme.  ...  This ensemble of uniquely identifiable objects creates opportunities for more direct integration between the physical world and computer-based systems, resulting in improved efficiency, accuracy, and economic  ... 
doi:10.1016/j.micpro.2017.06.005 fatcat:qwfgj4fawbfhbeexe7n7ce5ybe

A Multi-Layer Moving Target Defense Approach for Protecting Resource-Constrained Distributed Devices [chapter]

Valentina Casola, Alessandra De Benedictis, Massimiliano Albanese
2014 Advances in Intelligent Systems and Computing  
We introduce a coverage-based security metric to quantify the level of security provided by each system configuration: such metric, along with other performance metrics, can be adopted to identify the  ...  Such mechanisms increase the uncertainty, complexity, and cost for attackers, limit the exposure of vulnerabilities, and ultimately increase overall resiliency.  ...  Instruction Set Randomization [8] is another technique for obfuscating the language understood by a system to protect against code-injection attacks: by randomizing the underlying systems instructions  ... 
doi:10.1007/978-3-319-04717-1_14 fatcat:6bacztvxevhqfn3am7l3gl63fm

6G Mobile Communications for Multi-Robot Smart Factory

Zhenyi Chen, Kwang-Cheng Chen, Chen Dong, Zixiang Nie
2021 Journal of ICT Standardization  
In addition to wireless technologies, this paper pays special attention to treat a smart factory as the integration of collaborative multi-robot systems for production robots and transportation robots.  ...  Multiple aspects of collaborative multi-robot systems enabled by wireless networking have been investigated, dynamic multi-robot task assignment for collaborative production robots and subsequent transportation  ...  A flexible topology for the collaborative cyber-physical system is desired. The closed-loop control applications typically demand a cycle time of 2-10 ms.  ... 
doi:10.13052/jicts2245-800x.934 fatcat:tlmp3sxvsfgdjebu7zzkng6ixy

A Systematic Review of the State of Cyber-Security in Water Systems

Nilufer Tuptuk, Peter Hazell, Jeremy Watson, Stephen Hailes
2021 Water  
We cover the publication statistics of the research in this area, the aspects of security being addressed, and future work required to achieve better cyber-security for water systems.  ...  Although this move improves sensing and control capacity and gives better integration with business requirements, it also increases the scope for attack from malicious entities that intend to conduct industrial  ...  Water systems are a type of cyber-physical system (CPS) that integrate computational and physical capabilities to control and monitor physical processes.  ... 
doi:10.3390/w13010081 fatcat:xahsj5j5x5al7gxrvolrsydkse

Cyber-physical-social-thinking space based science and technology framework for the Internet of Things

HuanSheng Ning, Hong Liu
2015 Science China Information Sciences  
The IoT influences the current science and technology system by enabling its relatively stable interrelations for an inevitable architecture reconfiguration.  ...  , session management, security and privacy, loop control, space-time consistency, nanotechnology, and quantum technology.  ...  Physics Acoustics, atomic/molecular physics, optics, particle/nuclear physics, plasma physics, radio physics, quantum physics. Systematics Systems analysis and integration, systems theory.  ... 
doi:10.1007/s11432-014-5209-2 fatcat:qkbir3lns5a6ppypsx6av7o7q4

Micro Smart Micro-grid and Its Cyber Security Aspects in a Port Infrastructure

Monica Canepa, Giampaolo Frugone, Riccardo Bozzo, Stefan Schauer
2020 American Journal of Information Science and Technology  
In this document, we will outline some features of a port smart grid and typical characteristics of cyber-attacks including potential ways to recognize it and suggestion for effective countermeasures.  ...  Such attacks are often based on malicious software (malware), which makes use of a controlling entity on the network to coordinate and propagate.  ...  Acquisition, normalization and correlation of security events coming from remote control systems, from ICT systems, from physical security systems. b.  ... 
doi:10.11648/j.ajist.20200401.11 fatcat:rswp2rdiz5hfpfas3ckvgxjs3e

Cyber Physical Systems: Design Challenges

Edward A. Lee
2008 2008 11th IEEE International Symposium on Object and Component-Oriented Real-Time Distributed Computing (ISORC)  
Cyber-Physical Systems (CPS) are integrations of computation and physical processes.  ...  Embedded computers and networks monitor and control the physical processes, usually with feedback loops where physical processes affect computations and vice versa.  ...  Introduction Cyber-Physical Systems (CPS) are integrations of computation with physical processes.  ... 
doi:10.1109/isorc.2008.25 dblp:conf/isorc/Lee08a fatcat:ev24ahbzuzawno3iqelrf5aybe
« Previous Showing results 1 — 15 out of 1,266 results