Articles with "stealthy attacks" as a keyword



Photo by iizanyar from unsplash

Responding to targeted stealthy attacks on Android using timely-captured memory dumps

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Access"

DOI: 10.1109/access.2022.3160531

Abstract: The increasing dominance of Android smartphones for everyday communication and data processing makes long-term stealthy malware an even more dangerous threat. Recent malware campaigns like Flubot demonstrate that by employing stealthy malware techniques even at… read more here.

Keywords: stealthy attacks; responding targeted; malware; evidence ... See more keywords
Photo by averey from unsplash

Robust Stealthy Attacks Based on Uncertain Costs and Labeled Finite Automata With Inputs

Sign Up to like & get
recommendations!
Published in 2023 at "IEEE Robotics and Automation Letters"

DOI: 10.1109/lra.2023.3250007

Abstract: This letter deals with the vulnerability analysis of cyber-physical systems subject to malicious actions. For this purpose, the considered system is assumed to be abstracted as a discrete event system. Labeled finite automata with inputs… read more here.

Keywords: stealthy attacks; system; finite automata; labeled finite ... See more keywords
Photo by possessedphotography from unsplash

The Vulnerability of Cyber-Physical System Under Stealthy Attacks

Sign Up to like & get
recommendations!
Published in 2021 at "IEEE Transactions on Automatic Control"

DOI: 10.1109/tac.2020.2987307

Abstract: In this article, we study the impact of stealthy attacks on the cyber-physical system (CPS) modeled as a stochastic linear system. An attack is characterised by a malicious injection into the system through input, output… read more here.

Keywords: system; resp strictly; cyber physical; physical system ... See more keywords
Photo by timdegroot from unsplash

Concurrent Receding Horizon Control and Estimation Against Stealthy Attacks

Sign Up to like & get
recommendations!
Published in 2023 at "IEEE Transactions on Automatic Control"

DOI: 10.1109/tac.2022.3195922

Abstract: In this article, we consider a game-theoretic framework for cyber-physical systems, where a defender develops a mitigation strategy against an intelligent attacker who exploits the system's uncertainty to remain undetected. The goal of the defender… read more here.

Keywords: stealthy attacks; system; horizon control; receding horizon ... See more keywords
Photo by possessedphotography from unsplash

Reachability Analysis of Cyber-Physical Systems Under Stealthy Attacks.

Sign Up to like & get
recommendations!
Published in 2020 at "IEEE transactions on cybernetics"

DOI: 10.1109/tcyb.2020.3025307

Abstract: This article studies the reachable set of cyber-physical systems subject to stealthy attacks with the Kullback-Leibler divergence adopted to describe the stealthiness. The reachable set is defined as the set in which both the system… read more here.

Keywords: physical systems; reachable set; cyber physical; reachability analysis ... See more keywords
Photo from wikipedia

Measurement-Based Optimal Stealthy Attacks on Remote State Estimation

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Transactions on Information Forensics and Security"

DOI: 10.1109/tifs.2022.3206419

Abstract: This paper focuses on designing measurement-based optimal stealthy attacks for linear cyber-physical systems (CPSs), where attackers aim to deteriorate the performance of remote state estimation and keep $\epsilon $ -stealthy to Kullback-Leibler divergence detector. Instead… read more here.

Keywords: stealthy attacks; remote state; state estimation; based optimal ... See more keywords
Photo from wikipedia

VMShield: Memory Introspection-Based Malware Detection to Secure Cloud-Based Services Against Stealthy Attacks

Sign Up to like & get
recommendations!
Published in 2021 at "IEEE Transactions on Industrial Informatics"

DOI: 10.1109/tii.2020.3048791

Abstract: With the rapid evolution of the industrial Internet, cloud service has emerged as a next-generation industrial standard that has the potential to revolutionize and transform the enterprise industry. In recent years, numerous enterprises have acknowledged… read more here.

Keywords: memory introspection; stealthy attacks; introspection based; introspection ... See more keywords
Photo from wikipedia

Detecting stealthy attacks against industrial control systems based on residual skewness analysis

Sign Up to like & get
recommendations!
Published in 2019 at "EURASIP Journal on Wireless Communications and Networking"

DOI: 10.1186/s13638-019-1389-1

Abstract: With the integration of the modern industrial control systems (ICS) with the Internet technology, ICS can make full use of the rich resources on the Internet to facilitate remote process control. However, every coin has… read more here.

Keywords: control systems; control; industrial control; stealthy attacks ... See more keywords