SoK: Security in real-time systems
Security is an increasing concern for real-time systems (RTS). Over the last decade or so,
researchers have demonstrated attacks and defenses aimed at such systems. In this article …
researchers have demonstrated attacks and defenses aimed at such systems. In this article …
[PDF][PDF] The cyber security body of knowledge
D Basin - University of Bristol, ch. Formal Methods for, 2021 - cybok.org
The CyBOK project would like to understand how the CyBOK is being used and its uptake.
The project would like organisations using, or intending to use, CyBOK for the purposes of …
The project would like organisations using, or intending to use, CyBOK for the purposes of …
A safe, secure, and predictable software architecture for deep learning in safety-critical systems
In the last decade, deep learning techniques reached human-level performance in several
specific tasks as image recognition, object detection, and adaptive control. For this reason …
specific tasks as image recognition, object detection, and adaptive control. For this reason …
Cross-layer design for secure and resilient cyber-physical systems
This book presents control and game-theoretic tools to design secure and resilient cyber-
physical systems, including cloud-enabled control systems, 3D printers, robotic systems, and …
physical systems, including cloud-enabled control systems, 3D printers, robotic systems, and …
Preserving physical safety under cyber attacks
Physical plants that form the core of the cyber-physical systems (CPSs) often have stringent
safety requirements and, recent attacks have shown that cyber intrusions can cause damage …
safety requirements and, recent attacks have shown that cyber intrusions can cause damage …
Software rejuvenation for safe operation of cyber–physical systems in the presence of run-time cyberattacks
Software rejuvenation refers to the periodic restoration of a computing system's software and
data with a previously saved image to eliminate undesired behavior due to unknown or …
data with a previously saved image to eliminate undesired behavior due to unknown or …
Combining switching mechanism with re-initialization and anomaly detection for resiliency of cyber–physical systems
Cyber–physical systems (CPS) play a pivotal role in numerous critical real-world
applications that have stringent requirements for safety. To enhance the CPS resiliency …
applications that have stringent requirements for safety. To enhance the CPS resiliency …
Design of software rejuvenation for CPS security using invariant sets
R Romagnoli, BH Krogh… - 2019 American Control …, 2019 - ieeexplore.ieee.org
Software rejuvenation has been proposed as a strategy to protect cyber-physical systems
(CSPs) against unanticipated and undetectable cyber attacks. The basic idea is to refresh …
(CSPs) against unanticipated and undetectable cyber attacks. The basic idea is to refresh …
Protecting actuators in safety-critical IoT systems from control spoofing attacks
In this paper, we propose a framework called Contego-TEE to secure Internet-of-Things (IoT)
edge devices with timing requirements from control spoofing attacks where an adversary …
edge devices with timing requirements from control spoofing attacks where an adversary …