Filters








258 Hits in 5.6 sec

Distorting an Adversary's View in Cyber-Physical Systems [article]

Gaurav Kumar Agarwal, Mohammed Karmoose, Suhas Diggavi, Christina Fragouli, Paulo Tabuada
2018 arXiv   pre-print
In Cyber-Physical Systems (CPSs), inference based on communicated data is of critical significance as it can be used to manipulate or damage the control operations by adversaries.  ...  In this paper, we propose distortion-based metrics to protect CPSs communication and show that it is possible to confuse adversaries with just a few bits of pre-shared keys.  ...  We introduces a new approach to CPS security, that aims to distort an adversary's view of a control system's states.  ... 
arXiv:1809.04580v1 fatcat:3a7lay2w2zeydfhgfdr7dbu6we

The Strategy and Tactics of Information Warfare [chapter]

Matt Bishop
2004 National Security in the Information Age  
For these reasons, the information age in warfare represents a significant disjuncture with the past.  ...  Just as the nuclear age elevated the logic of deterrence over destruction, in the information age, the logic of disruption has the potential to rival the logic of destruction.  ...  Our analysis focuses in detail on cyber attacks directed against physical and cyber targets.  ... 
doi:10.4324/9780203005859.ch5 fatcat:db6adl4omrhrxlz67n3hwedo5i

The Strategy and Tactics of Information Warfare

Matt Bishop, Emily Goldman
2003 Contemporary Security Policy  
For these reasons, the information age in warfare represents a significant disjuncture with the past.  ...  Just as the nuclear age elevated the logic of deterrence over destruction, in the information age, the logic of disruption has the potential to rival the logic of destruction.  ...  Our analysis focuses in detail on cyber attacks directed against physical and cyber targets.  ... 
doi:10.1080/13523260312331271839 fatcat:puhv7yl56nhqxp4kciu2uli2de

Veracity, Plausibility, and Reputation [chapter]

Dieter Gollmann
2012 Lecture Notes in Computer Science  
We examine examples for veracity mechanisms from network management and conclude with a discussion of security in cyberphysical systems.  ...  To secure an application, one thus may have to go beyond securing the infrastructure and in addition provide mechanisms for detecting false data.  ...  Securing Cyber-Physical Systems The "applications" in Section 3 had been network management functions.  ... 
doi:10.1007/978-3-642-30955-7_3 fatcat:xem7iekawbaijoiinszw7bshui

The Role of Digital Forensics in Spectrum Warfare

Dauda Sule
2021 Zenodo  
for cyber and physical warfare to converge (Newman, 2019) -a real-time physical response.  ...  This was also a milestone in terms of a cyber-attack having a direct effect on physical infrastructure.  ... 
doi:10.5281/zenodo.5857392 fatcat:gncel3sfsjfblaqjwoler7na6u

Cyber Deception for Computer and Network Security: Survey and Challenges [article]

Zhuo Lu, Cliff Wang, Shangqing Zhao
2020 arXiv   pre-print
Motivated by recent advances in cyber deception research, we in this paper provide a formal view of cyber deception, and review high-level deception schemes and actions.  ...  , in-host-system deception and cryptography based deception.  ...  The work in [32] presented a new approach for selfconfiguring honeypots that can carry out passively check on network traffic of cyber-physical systems (CPS) and adjust to the sensing environment to  ... 
arXiv:2007.14497v1 fatcat:fddyekpkprarfopmf3bzpuxsxi

Using Deception to Shield Cyberspace Sensors [chapter]

Mason Rice, Daniel Guernsey, Sujeet Shenoi
2011 IFIP Advances in Information and Communication Technology  
The honeynet presents an intruder with a carbon copy of the utility's SCADA systems.  ...  Because of the reported cyber intrusions into America's electric power grid and other utilities, there is the possibility that sensors could also be positioned in key privately-owned infrastructure assets  ...  Disinformation can distort the adversary's confidence in its intelligence channels [3] . This, in turn, may affect the credibility of other adversary assessments.  ... 
doi:10.1007/978-3-642-24864-1_1 fatcat:x4hbsv23knhrppnm365zde2pji

Achieving cyberdeterrence and the ability of small states to hold large states at risk

Jason Rivera
2015 2015 7th International Conference on Cyber Conflict: Architectures in Cyberspace  
It is these disparities in cyber power that present conceptual challenges, especially when measuring power in terms of military size, budget, strength, and technological capabilities.  ...  adversary's critical cyberspace security objectives (CSOs) at risk a by communicating its own retaliatory or autonomous cyberspace capability. paper introduces a hypothesis on how small, less powerful  ...  organization or person responsible for the nefarious activity. 19 In both cases, attribution is not an end in itself but a means for holding the adversary's critical cyber equities and objectives at  ... 
doi:10.1109/cycon.2015.7158465 dblp:conf/cycon/Rivera15 fatcat:6inqgr7k3vgn7gbyhixldcuwty

Defeat Mechanisms in Modern Warfare

Frank Hoffman
2021 Parameters  
Rather than debate over attrition versus maneuver, combinations of a suite of defeat mechanisms should be applied to gain victory in the future.  ...  It argues for adaptations to an old operational design technique-defeat mechanisms; updates to Joint and service planning doctrine; and discipline regarding emerging concepts.  ...  One function of disorientation could include the injection of disinformation into, or corruption of, an adversary's command and control systems with spoofed data.  ... 
doi:10.55540/0031-1723.3091 fatcat:dvwnwoymvfedjihqtew3yau3ha

Cyber-Security Aware Design of Automated Systems

R. Stetter, M. Witczak, M. Till
2022 Proceedings of the Design Society  
This paper proposes a systemic approach to design processes and products for increased cyber security. This approach is based on an attack model and is explained based on an automated storage system.  ...  AbstractOne of the main current threats for producing companies is the possibility of cyber-space attacks.  ...  Acknowledgement Parts of this research were supported in the scope of the project "Automatisierter Entwurf eines geometrischen und kinetischen digitalen Zwillings einer Rohbaufertigungsanlage für die Virtuelle  ... 
doi:10.1017/pds.2022.201 fatcat:oicwjhpgszdgnjxdfrdilya6lq

UWB-ED: Distance Enlargement Attack Detection in Ultra-Wideband [article]

Mridula Singh, Patrick Leu, AbdelRahman Abdou, Srdjan Capkun
2019 arXiv   pre-print
Mobile autonomous systems, robots, and cyber-physical systems rely on accurate positioning information.  ...  transmitted between devices, after distorting the authentic signal to prevent the receiver from identifying it.  ...  Introduction Ranging and positioning information is often necessary for mobile autonomous systems, robots and cyber-physical systems to operate successfully.  ... 
arXiv:1911.11078v1 fatcat:xy3mcwrkz5gevde3cv6cdyfoky

Distortion based Light-weight Security for Cyber-Physical Systems [article]

Gaurav Kumar Agarwal, Mohammed Karmoose, Suhas Diggavi, Christina Fragouli, Paulo Tabuada
2020 arXiv   pre-print
In Cyber-Physical Systems (CPS), inference based on communicated data is of critical significance as it can be used to manipulate or damage the control operations by adversaries.  ...  In particular, we will show that a linear dynamical system can communicate its state in a manner that prevents an eavesdropper from accurately learning the state.  ...  This paper introduces a new approach to secure communication in CPS, that aims to distort an adversary's view of a control system's states.  ... 
arXiv:2006.15998v1 fatcat:rqwqseptu5bozhzalymlzwqsi4

Evaluating the Security of Aircraft Systems [article]

Edan Habler, Ron Bitton, Asaf Shabtai
2022 arXiv   pre-print
In addition, we present a comprehensive and in-depth taxonomy that standardizes the knowledge and understanding of cyber security in the avionics field from an adversary's perspective.  ...  In recent years, we have witnessed various cyber attacks on transportation systems, including attacks on ports, airports, and trains.  ...  The MITRE model systematically explains the adversaries' actions to be executed in the target device/system/domain from an adversary's perspective.  ... 
arXiv:2209.04028v1 fatcat:ck5h4d6kovajlklhy5ym77peu4

Deception used for cyber defense of control systems

Miles A. McQueen, Wayne F. Boyer
2009 2009 2nd Conference on Human System Interactions  
Control system cyber security defense mechanisms may employ deception in human system interactions to make it more difficult for attackers to plan and execute successful attacks.  ...  security of control systems.  ...  DECEPTION TAXONOMY Deception is fundamentally about distorting an adversary's perceptions of reality. The distortion may be self-induced, may be accidental, or may be deliberate [4] .  ... 
doi:10.1109/hsi.2009.5091050 fatcat:6cavjz3yczaj3k333zh2gz3j5i

Pakistan in the Crosshairs and the Rising Stakes of Strategic Information Warfare

Dr. Sahibzada Muhammad Usman
2024 Journal of Research in Social Sciences  
In the south Asian context, Pakistan faces a direct threat from India, which collaborates closely with Israel, by the use of SIW.  ...  information and communication technologies (ICTs) have reaped significant attention from security experts, computer scientists, intelligence agencies, and governments for their potential applications in  ...  Ideas, belief systems, and public opinion may all be targeted in addition to the actual physical infrastructure.  ... 
doi:10.52015/jrss.12i1.235 fatcat:ck7n36kycjaxnfwtttrkscyg2q
« Previous Showing results 1 — 15 out of 258 results