Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleOctober 2024
Mask defect detection by combining wiener deconvolution and illumination optimization
AbstractIn the lithography process, mask defect is inevitably replicated on chips hence the yield and quality of the product are directly related to the mask quality. Mask microscopy resolution is then an essential specification. In this work, a high-...
Graphical abstractDisplay Omitted
Highlights- The actual resolution of the detection system, theoretically estimated at 3.0 μm, has been effectively improved to 2.5 μm.
- This method significantly enhances the detection contrast, while also ensuring the effective identification of ...
- research-articleSeptember 2024
Deception-Resistant Stochastic Manufacturing for Automated Production Lines
RAID '24: Proceedings of the 27th International Symposium on Research in Attacks, Intrusions and DefensesPages 546–560https://doi.org/10.1145/3678890.3678896The advancement of Industrial Internet-of-Things (IIoT) magnifies the cyber risk of automated production lines, especially to deception attacks that tamper with the monitoring data to prevent the manipulated operation of production lines from being ...
- research-articleNovember 2024
Cyber risk assessment of cyber-enabled autonomous cargo vessel
International Journal of Critical Infrastructure Protection (IJCIP), Volume 46, Issue Chttps://doi.org/10.1016/j.ijcip.2024.100695AbstractThe increasing interest in autonomous ships within the maritime industry is driven by the pursuit of revenue optimization, operational efficiency, safety improvement and going greener. However, the industry’s increasing reliance on emerging ...
- ArticleJuly 2024
Towards Atomicity and Composability in Cross-Chain NFTs
Data and Applications Security and Privacy XXXVIIIPages 92–100https://doi.org/10.1007/978-3-031-65172-4_6AbstractNon-Fungible Tokens (NFTs) have created new and interesting ways to own digital assets. Our work defines non-fungible tokens as a pair and addresses challenges in cross-chain NFT transfers, particularly on interoperability between siloed ...
- opinionAugust 2024
The Need of Testbeds for Cyberphysical System Security
IEEE Security and Privacy (IEEE-SEC-PRIVACY), Volume 22, Issue 4Pages 4–6https://doi.org/10.1109/MSEC.2024.3401889Critical infrastructure becomes a strategic target in the midst of a cyberwar. A classic example is the Stuxnet attack targeting Iran’s nuclear power plant in 20101 by exploiting four zero-day flaws to compromise supervisory control and data acquisition (...
-
- research-articleJuly 2024
CryptGraph: An Efficient Privacy-Enhancing Solution for Accurate Shortest Path Retrieval in Cloud Environments
ASIA CCS '24: Proceedings of the 19th ACM Asia Conference on Computer and Communications SecurityPages 1660–1674https://doi.org/10.1145/3634737.3656293With the widespread adoption of cloud computing, it is a popular trend to migrate shortest path and distance (SPD) retrieval on large-scale graphs to cloud environments, harnessing their immense computational capabilities. To protect sensitive ...
- proceedingJuly 2024
ASIA CCS '24: Proceedings of the 19th ACM Asia Conference on Computer and Communications Security
It is our great pleasure to welcome you to ACM AsiaCCS 2024, the 19th ACM Asia Conference on Computer and Communications Security. AsiaCCS 2024 takes place in Singapore from 1 July to 5 July.
- research-articleMay 2024
PAGE: Equilibrate Personalization and Generalization in Federated Learning
WWW '24: Proceedings of the ACM Web Conference 2024Pages 2955–2964https://doi.org/10.1145/3589334.3645513Federated learning (FL) is becoming a major driving force behind machine learning as a service, where customers (clients) collaboratively benefit from shared local updates under the orchestration of the service provider (server). Representing clients' ...
- ArticleJune 2024
Guidelines for Cyber Risk Management in Autonomous Shipping
Applied Cryptography and Network Security WorkshopsPages 143–161https://doi.org/10.1007/978-3-031-61489-7_9AbstractThe emergence of autonomous ships represents a significant advancement in maritime technology, promising enhanced efficiency, reduced operating costs and reducing or even completely removing crews from hazardous environments. However, the progress ...
- ArticleJune 2024
Towards Discovering Quantum-Threats for Applications Using Open-Source Libraries
Applied Cryptography and Network Security WorkshopsPages 283–302https://doi.org/10.1007/978-3-031-61486-6_17AbstractThe improvement of quantum computing poses a significant threat to cryptographic security. It enables the potential utilization of quantum algorithms to compromise classical cryptographic algorithms, such as public-key cryptosystems including RSA (...
- ArticleJune 2024
Device Fingerprinting in a Smart Grid CPS
Applied Cryptography and Network Security WorkshopsPages 215–234https://doi.org/10.1007/978-3-031-61486-6_13AbstractData integrity attacks on the various meter readings found in smart grid systems can be executed to be undetectable by current detection algorithms used in smart grid systems. These unobservable cyberattacks present a potentially dangerous threat ...
- research-articleJanuary 2024
From sinking to saving: MITRE ATT &CK and D3FEND frameworks for maritime cybersecurity
International Journal of Information Security (IJOIS), Volume 23, Issue 3Pages 1603–1618https://doi.org/10.1007/s10207-024-00812-4AbstractCybersecurity is a growing concern for maritime sector. Modern ships are practical realism of cyber physical systems that utilize both information technologies and operational technologies. Cybersecurity incidents on such systems require robust ...
- research-articleApril 2024
Dynamic Group Time-Based One-Time Passwords
IEEE Transactions on Information Forensics and Security (TIFS), Volume 19Pages 4897–4913https://doi.org/10.1109/TIFS.2024.3386350Group time-based one-time passwords (GTOTP) is a novel lightweight cryptographic primitive for achieving anonymous client authentication, which enables the efficient generation of time-based one-time passwords on behalf of a group without revealing any ...
- research-articleJanuary 2024
Secure Channel Establishment Scheme for Task Delivery in Vehicular Cloud Computing
IEEE Transactions on Information Forensics and Security (TIFS), Volume 19Pages 2865–2880https://doi.org/10.1109/TIFS.2024.3356809Vehicular cloud computing (VCC) is a network architecture that allows a group of entities (i.e., vehicles/roadside infrastructures) to share their resources with other entities. Task delivery in VCC involves the delegation of computation/storage task from ...
- research-articleDecember 2023
Accountable Fine-Grained Blockchain Rewriting in the Permissionless Setting
IEEE Transactions on Information Forensics and Security (TIFS), Volume 19Pages 1756–1766https://doi.org/10.1109/TIFS.2023.3340917Blockchain rewriting with fine-grained access control allows a user to create a transaction associated with a set of attributes, while a modifier who possesses sufficient rewriting privileges from a trusted authority satisfying the attribute set can ...
- research-articleDecember 2023Best Paper
SePanner: Analyzing Semantics of Controller Variables in Industrial Control Systems based on Network Traffic
ACSAC '23: Proceedings of the 39th Annual Computer Security Applications ConferencePages 310–323https://doi.org/10.1145/3627106.3627179Programmable logic controllers (PLCs), the essential components of critical infrastructure, play a crucial role in various industrial manufacturing processes. Recent attack events show that attackers have a strong interest in tampering with the ...
- research-articleNovember 2023
Optimizing Proof of Aliveness in Cyber-Physical Systems
IEEE Transactions on Dependable and Secure Computing (TDSC), Volume 21, Issue 4Pages 3610–3628https://doi.org/10.1109/TDSC.2023.3335188At ACSAC 2019, we introduced a new cryptographic primitive called proof of aliveness (PoA), allowing us to remotely and automatically track the running status (aliveness) of devices in the fields in cyber-physical systems. We proposed to use a one-way ...
- ArticleDecember 2023
VNGuard: Intrusion Detection System for In-Vehicle Networks
AbstractRecently, autonomous and connected vehicles have gained popularity, revolutionizing consumer mobility. On the other hand, they are also becoming new targets exposing new attack vectors and vulnerabilities that may lead to critical consequences. In ...
- research-articleOctober 2023
FieldFuzz: In Situ Blackbox Fuzzing of Proprietary Industrial Automation Runtimes via the Network
- Andrei Bytes,
- Prashant Hari Narayan Rajput,
- Constantine Doumanidis,
- Michail Maniatakos,
- Jianying Zhou,
- Nils Ole Tippenhauer
RAID '23: Proceedings of the 26th International Symposium on Research in Attacks, Intrusions and DefensesPages 499–512https://doi.org/10.1145/3607199.3607226Networked Programmable Logic Controllers (PLCs) are proprietary industrial devices utilized in critical infrastructure that execute control logic applications in complex proprietary runtime environments that provide standardized access to the hardware ...