Articles with "injection attacks" as a keyword



Photo by hakannural from unsplash

Statistical properties of side-channel and fault injection attacks using coding theory

Sign Up to like & get
recommendations!
Published in 2017 at "Cryptography and Communications"

DOI: 10.1007/s12095-017-0271-4

Abstract: Naïve implementation of block ciphers are subject to side-channel and fault injection attacks. To deceive side-channel attacks and to detect fault injection attacks, the designer inserts specially crafted error correcting codes in the implementation. The… read more here.

Keywords: side channel; injection attacks; fault injection; channel fault ... See more keywords
Photo from wikipedia

Stealthy output injection attacks on control systems with bounded variables

Sign Up to like & get
recommendations!
Published in 2017 at "International Journal of Control"

DOI: 10.1080/00207179.2016.1207099

Abstract: ABSTRACT As more and more critical infrastructures such as transportation, power systems and water are being embedded with sensing and control and linked to the Internet, the resulting security vulnerability can be exploited to inflict… read more here.

Keywords: systems bounded; injection attacks; control systems; stealthy output ... See more keywords
Photo by hakannural from unsplash

Distributed non-fragile set-membership filtering for nonlinear systems under fading channels and bias injection attacks

Sign Up to like & get
recommendations!
Published in 2021 at "International Journal of Systems Science"

DOI: 10.1080/00207721.2021.1872118

Abstract: In this paper, the secure distributed set-membership filtering problem is investigated for general nonlinear system over wireless sensor networks. For the purpose of getting close to practical wireless sensor networks, both the bias injection attacks… read more here.

Keywords: set membership; membership filtering; bias injection; injection attacks ... See more keywords
Photo by thinkmagically from unsplash

Securing Ultrasonic Sensors Against Signal Injection Attacks Based on a Mathematical Model

Sign Up to like & get
recommendations!
Published in 2019 at "IEEE Access"

DOI: 10.1109/access.2019.2932843

Abstract: Ultrasonic sensors are used across a variety of industrial areas, as they measure distance simply via calculating the difference of time between transmission and reception of signals. However, recently, attackers have been targeting ultrasonic sensors… read more here.

Keywords: ultrasonic sensors; model; signal injection; injection attacks ... See more keywords
Photo by hakannural from unsplash

How Practical Are Fault Injection Attacks, Really?

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Access"

DOI: 10.1109/access.2022.3217212

Abstract: Fault injection attacks (FIA) are a class of active physical attacks, mostly used for malicious purposes such as extraction of cryptographic keys, privilege escalation, attacks on neural network implementations. There are many techniques that can… read more here.

Keywords: injection; fault injection; attacks really; injection attacks ... See more keywords
Photo from wikipedia

Synthesizing Pareto-Optimal Signal-Injection Attacks on ICDs

Sign Up to like & get
recommendations!
Published in 2023 at "IEEE Access"

DOI: 10.1109/access.2022.3233010

Abstract: Implantable Cardioverter Defibrillators (ICDs) are medical cyber-physical systems that monitor cardiac activity and administer therapy shocks in response to sensed irregular electrograms (EGMs) to prevent cardiac arrest. Prior work has shown that the analog sensors… read more here.

Keywords: injection; signal injection; injection attacks; optimal signal ... See more keywords
Photo by hakannural from unsplash

Three Birds With One Stone: User Intention Understanding and Influential Neighbor Disclosure for Injection Attack Detection

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Transactions on Information Forensics and Security"

DOI: 10.1109/tifs.2022.3146769

Abstract: Recommender system, as a data-driven way to help customers locate products that match their interests, is increasingly critical for providing competitive customer suggestions in many web services. However, recommender systems are highly vulnerable to malicious… read more here.

Keywords: injection; intention understanding; user intention; detection ... See more keywords
Photo by susangkomen3day from unsplash

Distributed Event-Triggered Bipartite Consensus for Multiagent Systems Against Injection Attacks

Sign Up to like & get
recommendations!
Published in 2023 at "IEEE Transactions on Industrial Informatics"

DOI: 10.1109/tii.2022.3157595

Abstract: This article studies fully distributed data-driven problems for nonlinear discrete-time multiagent systems (MASs) with fixed and switching topologies preventing injection attacks. We first develop an enhanced compact form dynamic linearization model by applying the designed… read more here.

Keywords: multiagent systems; distributed event; bipartite consensus; injection attacks ... See more keywords
Photo by chrisliverani from unsplash

Minimax-Regret Robust Defensive Strategy Against False Data Injection Attacks

Sign Up to like & get
recommendations!
Published in 2019 at "IEEE Transactions on Smart Grid"

DOI: 10.1109/tsg.2017.2788040

Abstract: This paper develops a multi-level game-theoretic framework for determining a cost-effective defensive strategy for protecting power systems from false data injection attacks like load redistribution attacks. First, a multi-level optimization problem considering interactions among defenders,… read more here.

Keywords: defensive strategy; data injection; strategy; minimax regret ... See more keywords
Photo by campaign_creators from unsplash

A Highly Discriminative Detector Against False Data Injection Attacks in AC State Estimation

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Transactions on Smart Grid"

DOI: 10.1109/tsg.2022.3141803

Abstract: False data injection attacks (FDIAs) can bypass conventional bad data detection methods. Recently developed FDIA detection methods based on statistical consistency of measurement values may not work effectively when false data do not significantly deviate… read more here.

Keywords: false data; injection attacks; state estimation; data injection ... See more keywords
Photo by hakannural from unsplash

Blind False Data Injection Attacks Against State Estimation Based on Matrix Reconstruction

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Transactions on Smart Grid"

DOI: 10.1109/tsg.2022.3164874

Abstract: Cyber, especially false data injection attacks (FDIAs), are gradually becoming a kind of severe threat to modern power grids. This paper proposes a blind FDIA approach against the state estimation of power grids based on… read more here.

Keywords: blind fdia; state estimation; injection attacks; data injection ... See more keywords