A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
Diversity-By-Design for Dependable and Secure Cyber-Physical Systems: A Survey
[article]
2020
arXiv
pre-print
on developing secure and dependable cyber-physical systems (CPSs) using diversity as a system design feature. ...
The concept of diversity-by-design emerged in the 1980's and, since then, diversity-based system design research has been explored to build more secure and dependable systems. ...
We discuss the design principle of what-to-diversify for three different systems, including cyber, physical, and cyber-physical systems. ...
arXiv:2007.08688v1
fatcat:q5umyoql4nfbfhbjlbdhavu72q
A Tutorial on Moving Target Defense Approaches Within Automotive Cyber-Physical Systems
2022
Frontiers in Future Transportation
With the rapid adoption of distributed automotive Cyber-Physical Systems (CPS) ranging from self driving cars, to connected transportation infrastructure, it is becoming more apparent that third party ...
Moving Target Defenses (MTD) have become a popular and emerging defense strategy for the protection of traditional information technology systems. ...
Instruction Set Randomization Many techniques have been proposed to defuse code injection attacks including stackguards, memory management unit access control lists, control flow integrity, and masking ...
doi:10.3389/ffutr.2021.792573
fatcat:trgep6iqovgu3jfj6f6m2d5joi
VERCASM-CPS: Vulnerability Analysis and Cyber Risk Assessment for Cyber-Physical Systems
2021
Information
Since Cyber-Physical Systems (CPS) are widely used in critical infrastructures, it is essential to protect their assets from cyber attacks to increase the level of security, safety and trustworthiness, ...
In this paper, we will compare cyber risk scores for different CPS configurations and show that the Windows® 10 build 20H2 operating system is more secure than Linux Ubuntu® 20.04, while Red Hat® Enterprise ...
Acknowledgments: We thank the Department of Computer Science and Cyber Education Research and Outreach Center (CEROC) at Tennessee Technological University for providing funds and resources for this project ...
doi:10.3390/info12100408
fatcat:lzxq32uh3vbtbjpvq3msw6eqty
Hardware and Security
[chapter]
2012
Handbook on Securing Cyber-Physical Critical Infrastructure
So, hardware security concerns the entire lifespan of a cyber-physical system, from before design until after retirement. ...
Despite the presence of malicious attacks, cyber-physical systems should be resilient and continue to operate correctly. ...
doi:10.1016/b978-0-12-415815-3.00012-1
fatcat:usk6j5webjdytjmtjublkukjve
Reconfiguration-Based VLSI Design for Security
2015
IEEE Journal on Emerging and Selected Topics in Circuits and Systems
Reconfigurable computing is a critical technology for achieving nanoelectronic systems of yield and reliability. ...
We further present reconfigurable reversible computing-based cryptography, and a generic reconfiguration-based VLSI design-for-security methodology. ...
ACKNOWLEDGMENTS We thank the reviewers and Dr. Ramesh Karri and Jeyavijayan Rajendran at NYU-Poly for their valuable comments. ...
doi:10.1109/jetcas.2014.2372431
fatcat:v2rsd2c2rjacbd2y7vfn7unwt4
Competency Pool and the competency model for cyber and information security professionals
2021
Zenodo
The extracted competencies of the competency model analysis and the competency model for cyber and information security professionals are presented. ...
Physical Security Physical Security Controls The cyber security professional is able to apply various physical security controls to mitigate risk and protect organizations, physical facilities, data, people ...
Cyber-Physical Systems & IoT The cyber security professional knows and understands the specific cyber security challenges associated with cyber-physical systems and IoT. ...
doi:10.5281/zenodo.4765646
fatcat:ok3zjkw2ive2tlrpl3btxqr6l4
Competency Pool and the competency model for cyber and information security professionals
2021
Zenodo
The extracted competencies of the competency model analysis and the competency model for cyber and information security professionals are presented. ...
Physical Security Physical Security Controls The cyber security professional is able to apply various physical security controls to mitigate risk and protect organizations, physical facilities, data, people ...
Cyber-Physical Systems & IoT The cyber security professional knows and understands the specific cyber security challenges associated with cyber-physical systems and IoT. ...
doi:10.5281/zenodo.4765645
fatcat:ge7mwxfwpbfk3lifnyoc7aixzq
Intrusion Detection Systems for Networked Unmanned Aerial Vehicles: A Survey
[article]
2018
arXiv
pre-print
the goals of both security and performance. ...
Networked UAVs are vulnerable to malicious attacks over open-air radio space and accordingly, intrusion detection systems (IDSs) have been naturally derived to deal with the vulnerabilities and/or attacks ...
Lastly, we discussed key research challenges that should be considered for future research plans, aiming to build an affordable, secure cyber-physical UAV-IDS system. ...
arXiv:1807.00435v1
fatcat:vvdkeimrzfejjmwmqvbq6fnd2q
Remote dynamic partial reconfiguration: A threat to Internet-of-Things and embedded security applications
2017
Microprocessors and microsystems
The advent of the Internet of Things has motivated the use of Field Programmable Gate Array (FPGA) devices with Dynamic Partial Reconfiguration (DPR) capabilities for dynamic non-invasive modifications ...
security applications -namely, a software implementation of a cryptographic algorithm and a cash dispensing scheme. ...
This ensemble of uniquely identifiable objects creates opportunities for more direct integration between the physical world and computer-based systems, resulting in improved efficiency, accuracy, and economic ...
doi:10.1016/j.micpro.2017.06.005
fatcat:qwfgj4fawbfhbeexe7n7ce5ybe
A Multi-Layer Moving Target Defense Approach for Protecting Resource-Constrained Distributed Devices
[chapter]
2014
Advances in Intelligent Systems and Computing
We introduce a coverage-based security metric to quantify the level of security provided by each system configuration: such metric, along with other performance metrics, can be adopted to identify the ...
Such mechanisms increase the uncertainty, complexity, and cost for attackers, limit the exposure of vulnerabilities, and ultimately increase overall resiliency. ...
Instruction Set Randomization [8] is another technique for obfuscating the language understood by a system to protect against code-injection attacks: by randomizing the underlying systems instructions ...
doi:10.1007/978-3-319-04717-1_14
fatcat:6bacztvxevhqfn3am7l3gl63fm
6G Mobile Communications for Multi-Robot Smart Factory
2021
Journal of ICT Standardization
In addition to wireless technologies, this paper pays special attention to treat a smart factory as the integration of collaborative multi-robot systems for production robots and transportation robots. ...
Multiple aspects of collaborative multi-robot systems enabled by wireless networking have been investigated, dynamic multi-robot task assignment for collaborative production robots and subsequent transportation ...
A flexible topology for the collaborative cyber-physical system is desired. The closed-loop control applications typically demand a cycle time of 2-10 ms. ...
doi:10.13052/jicts2245-800x.934
fatcat:tlmp3sxvsfgdjebu7zzkng6ixy
A Systematic Review of the State of Cyber-Security in Water Systems
2021
Water
We cover the publication statistics of the research in this area, the aspects of security being addressed, and future work required to achieve better cyber-security for water systems. ...
Although this move improves sensing and control capacity and gives better integration with business requirements, it also increases the scope for attack from malicious entities that intend to conduct industrial ...
Water systems are a type of cyber-physical system (CPS) that integrate computational and physical capabilities to control and monitor physical processes. ...
doi:10.3390/w13010081
fatcat:xahsj5j5x5al7gxrvolrsydkse
Cyber-physical-social-thinking space based science and technology framework for the Internet of Things
2015
Science China Information Sciences
The IoT influences the current science and technology system by enabling its relatively stable interrelations for an inevitable architecture reconfiguration. ...
, session management, security and privacy, loop control, space-time consistency, nanotechnology, and quantum technology. ...
Physics
Acoustics, atomic/molecular physics, optics, particle/nuclear physics, plasma physics,
radio physics, quantum physics.
Systematics
Systems analysis and integration, systems theory. ...
doi:10.1007/s11432-014-5209-2
fatcat:qkbir3lns5a6ppypsx6av7o7q4
Micro Smart Micro-grid and Its Cyber Security Aspects in a Port Infrastructure
2020
American Journal of Information Science and Technology
In this document, we will outline some features of a port smart grid and typical characteristics of cyber-attacks including potential ways to recognize it and suggestion for effective countermeasures. ...
Such attacks are often based on malicious software (malware), which makes use of a controlling entity on the network to coordinate and propagate. ...
Acquisition, normalization and correlation of security events coming from remote control systems, from ICT systems, from physical security systems. b. ...
doi:10.11648/j.ajist.20200401.11
fatcat:rswp2rdiz5hfpfas3ckvgxjs3e
Cyber Physical Systems: Design Challenges
2008
2008 11th IEEE International Symposium on Object and Component-Oriented Real-Time Distributed Computing (ISORC)
Cyber-Physical Systems (CPS) are integrations of computation and physical processes. ...
Embedded computers and networks monitor and control the physical processes, usually with feedback loops where physical processes affect computations and vice versa. ...
Introduction Cyber-Physical Systems (CPS) are integrations of computation with physical processes. ...
doi:10.1109/isorc.2008.25
dblp:conf/isorc/Lee08a
fatcat:ev24ahbzuzawno3iqelrf5aybe
« Previous
Showing results 1 — 15 out of 1,266 results