Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleJanuary 2025JUST ACCEPTED
Real-time Adversarial Image Perturbations for Autonomous Vehicles using Reinforcement Learning
The deep neural network (DNN) model for computer vision tasks (object detection and classification) is widely used in autonomous vehicles, such as driverless cars and unmanned aerial vehicles. However, DNN models are shown to be vulnerable to adversarial ...
- research-articleJanuary 2025JUST ACCEPTED
- research-articleNovember 2024
REMaQE: Reverse Engineering Math Equations from Executables
ACM Transactions on Cyber-Physical Systems (TCPS), Volume 8, Issue 4Article No.: 43, Pages 1–25https://doi.org/10.1145/3699674Cybersecurity attacks on embedded devices for industrial control systems and cyber-physical systems may cause catastrophic physical damage as well as economic loss. This could be achieved by infecting device binaries with malware that modifies the ...
- research-articleNovember 2024
A Comprehensive Threat Modelling Analysis for Distributed Energy Resources
ACM Transactions on Cyber-Physical Systems (TCPS), Volume 8, Issue 4Article No.: 40, Pages 1–32https://doi.org/10.1145/3678260The exponential rise in popularity of distributed energy resources (DERs) is attributed to their numerous benefits within the power sector. However, the risks that new DERs pose to the power grid have not yet been closely assessed, exposing a gap in the ...
- research-articleNovember 2024
Cyber Security of Smart-Grid Frequency Control: A Review and Vulnerability Assessment Framework
ACM Transactions on Cyber-Physical Systems (TCPS), Volume 8, Issue 4Article No.: 38, Pages 1–27https://doi.org/10.1145/3661827Smart grid involves application of information and communication technology (ICT) for monitoring, protection, operation and control of interconnected power systems under various scenarios. Smart grid control (SGC) is an important aspect that is constantly ...
-
- research-articleMay 2024
Performance Comparison of Timing-Based Anomaly Detectors for Controller Area Network: A Reproducible Study
ACM Transactions on Cyber-Physical Systems (TCPS), Volume 8, Issue 2Article No.: 15, Pages 1–24https://doi.org/10.1145/3604913This work presents an experimental evaluation of the detection performance of eight different algorithms for anomaly detection on the Controller Area Network (CAN) bus of modern vehicles based on the analysis of the timing or frequency of CAN messages. ...
- research-articleMay 2024
Remote Perception Attacks against Camera-based Object Recognition Systems and Countermeasures
ACM Transactions on Cyber-Physical Systems (TCPS), Volume 8, Issue 2Article No.: 14, Pages 1–27https://doi.org/10.1145/3596221In vision-based object recognition systems, imaging sensors perceive the environment and then objects are detected and classified for decision-making purposes, e.g., to maneuver an automated vehicle around an obstacle or to raise alarms for intruders in ...
- research-articleMay 2024
CANOA: CAN Origin Authentication through Power Side-channel Monitoring
ACM Transactions on Cyber-Physical Systems (TCPS), Volume 8, Issue 2Article No.: 13, Pages 1–30https://doi.org/10.1145/3571288The lack of any sender authentication mechanism in place makes Controller Area Network (CAN) vulnerable to security threats. For instance, an attacker can impersonate an Electronic Control Unit (ECU) on the bus and send spoofed messages unobtrusively with ...
- research-articleMay 2024
EVScout2.0: Electric Vehicle Profiling through Charging Profile
ACM Transactions on Cyber-Physical Systems (TCPS), Volume 8, Issue 2Article No.: 11, Pages 1–24https://doi.org/10.1145/3565268Electric Vehicles (EVs) represent a green alternative to traditional fuel-powered vehicles. To enforce their widespread use, both the technical development and the security of users shall be guaranteed. Users’ privacy represents a possible threat that ...
- research-articleJanuary 2024
A Blockchain Architecture to Increase the Resilience of Industrial Control Systems from the Effects of a Ransomware Attack: A Proposal and Initial Results
ACM Transactions on Cyber-Physical Systems (TCPS), Volume 8, Issue 1Article No.: 9, Pages 1–13https://doi.org/10.1145/3637553The motivation of this research (and also one of the nation’s cyber goals) is enhancing the resilience of Industrial Control Systems (ICS)/Supervisory Control and Data Acquisition (SCADA) systems against ransomware attacks. ICS and SCADA systems run some ...
- research-articleJanuary 2024
Techniques for Enhancing Security in Industrial Control Systems
ACM Transactions on Cyber-Physical Systems (TCPS), Volume 8, Issue 1Article No.: 6, Pages 1–36https://doi.org/10.1145/3630103Increasingly Industrial Control Systems (ICS) systems are being connected to the Internet to minimise the operational costs and provide additional flexibility. These control systems such as the ones used in power grids, manufacturing and utilities operate ...
- research-articleJanuary 2024
A Combinatorial Optimization Analysis Method for Detecting Malicious Industrial Internet Attack Behaviors
ACM Transactions on Cyber-Physical Systems (TCPS), Volume 8, Issue 1Article No.: 8, Pages 1–20https://doi.org/10.1145/3637554Industrial Internet plays an important role in key critical infrastructure sectors and is the target of different security threats and risks. There are limitations in many existing attack detection approaches, such as function redundancy, overfitting, and ...
- research-articleJanuary 2024
RollBack: A New Time-Agnostic Replay Attack Against the Automotive Remote Keyless Entry Systems
- Levente Csikor,
- Hoon Wei Lim,
- Jun Wen Wong,
- Soundarya Ramesh,
- Rohini Poolat Parameswarath,
- Mun Choon Chan
ACM Transactions on Cyber-Physical Systems (TCPS), Volume 8, Issue 1Article No.: 5, Pages 1–25https://doi.org/10.1145/3627827Automotive Keyless Entry (RKE) systems provide car owners with a degree of convenience, allowing them to lock and unlock their car without using a mechanical key. Today’s RKE systems implement disposable rolling codes, making every key fob button press ...
- research-articleOctober 2023
HPRoP: Hierarchical Privacy-preserving Route Planning for Smart Cities
- Francis Tiausas,
- Keiichi Yasumoto,
- Jose Paolo Talusan,
- Hayato Yamana,
- Hirozumi Yamaguchi,
- Shameek Bhattacharjee,
- Abhishek Dubey,
- Sajal K. Das
ACM Transactions on Cyber-Physical Systems (TCPS), Volume 7, Issue 4Article No.: 27, Pages 1–25https://doi.org/10.1145/3616874Route Planning Systems (RPS) are a core component of autonomous personal transport systems essential for safe and efficient navigation of dynamic urban environments with the support of edge-based smart city infrastructure, but they also raise concerns ...
- research-articleOctober 2023
Investigating the Security of EV Charging Mobile Applications as an Attack Surface
ACM Transactions on Cyber-Physical Systems (TCPS), Volume 7, Issue 4Article No.: 26, Pages 1–28https://doi.org/10.1145/3609508The adoption rate of EVs has witnessed a significant increase in recent years driven by multiple factors, chief among which is the increased flexibility and ease of access to charging infrastructure. To improve user experience and increase system ...
- research-articleOctober 2023
Message Authentication and Provenance Verification for Industrial Control Systems
ACM Transactions on Cyber-Physical Systems (TCPS), Volume 7, Issue 4Article No.: 24, Pages 1–28https://doi.org/10.1145/3607194Successful attacks against industrial control systems (ICSs) often exploit insufficient checking mechanisms. While firewalls, intrusion detection systems, and similar appliances introduce essential checks, their efficacy depends on the attackers’ ability ...
- research-articleOctober 2023
Safe Maintenance of Railways using COTS Mobile Devices: The Remote Worker Dashboard
- Tommaso Zoppi,
- Innocenzo Mungiello,
- Andrea Ceccarelli,
- Alberto Cirillo,
- Lorenzo Sarti,
- Lorenzo Esposito,
- Giuseppe Scaglione,
- Sergio Repetto,
- Andrea Bondavalli
ACM Transactions on Cyber-Physical Systems (TCPS), Volume 7, Issue 4Article No.: 25, Pages 1–20https://doi.org/10.1145/3607193The railway domain is regulated by rigorous safety standards to ensure that specific safety goals are met. Often, safety-critical systems rely on custom hardware-software components that are built from scratch to achieve specific functional and non-...
- research-articleJuly 2023
System Verification and Runtime Monitoring with Multiple Weakly-Hard Constraints
- Yi-Ting Hsieh,
- Tzu-Tao Chang,
- Chen-Jun Tsai,
- Shih-Lun Wu,
- Ching-Yuan Bai,
- Kai-Chieh Chang,
- Chung-Wei Lin,
- Eunsuk Kang,
- Chao Huang,
- Qi Zhu
ACM Transactions on Cyber-Physical Systems (TCPS), Volume 7, Issue 3Article No.: 21, Pages 1–28https://doi.org/10.1145/3603380A weakly-hard fault model can be captured by an (m,k) constraint, where 0≤ m≤ k, meaning that there are at most m bad events (faults) among any k consecutive events. In this article, we use a weakly-hard fault model to constrain the occurrences of faults ...
- research-articleJuly 2023
Automated Adversary-in-the-Loop Cyber-Physical Defense Planning
ACM Transactions on Cyber-Physical Systems (TCPS), Volume 7, Issue 3Article No.: 18, Pages 1–25https://doi.org/10.1145/3596222Security of cyber-physical systems (CPS) continues to pose new challenges due to the tight integration and operational complexity of the cyber and physical components. To address these challenges, this article presents a domain-aware, optimization-based ...
- research-articleJuly 2023
Toward a Distributed Trust Management System for Misbehavior Detection in the Internet of Vehicles
ACM Transactions on Cyber-Physical Systems (TCPS), Volume 7, Issue 3Article No.: 16, Pages 1–25https://doi.org/10.1145/3594637Recent considerable state-of-the-art advancements within the automotive sector, coupled with an evolution of the promising paradigms of vehicle-to-everything communication and the Internet of Vehicles (IoV), have facilitated vehicles to generate and, ...