Detection-performance tradeoff for watermarking in industrial control systems
The watermarking method, which adds unique watermarks to data, has been widely used for
integrity attack detection in industrial control systems (ICSs). Existing literature generally …
integrity attack detection in industrial control systems (ICSs). Existing literature generally …
PARL: Poisoning Attacks Against Reinforcement Learning-based Recommender Systems
Recommender systems predict and suggest relevant options to users in various domains,
such as e-commerce, streaming services, and social media. Recently, deep reinforcement …
such as e-commerce, streaming services, and social media. Recently, deep reinforcement …
SePanner: Analyzing Semantics of Controller Variables in Industrial Control Systems based on Network Traffic
Programmable logic controllers (PLCs), the essential components of critical infrastructure,
play a crucial role in various industrial manufacturing processes. Recent attack events show …
play a crucial role in various industrial manufacturing processes. Recent attack events show …
Unveiling Physical Semantics of PLC Variables Using Control Invariants
The security risk of semantic attacks to Industrial Control Systems (ICSs) is increasing.
Semantic attacks manipulate targeted system modules by identifying the physical semantics …
Semantic attacks manipulate targeted system modules by identifying the physical semantics …
Reverse Engineering Industrial Protocols Driven By Control Fields
Z Qin, Z Yang, Y Geng, X Che, T Wang… - … -IEEE Conference on …, 2024 - ieeexplore.ieee.org
Industrial protocols are widely used in Industrial Control Systems (ICSs) to network physical
devices, thus playing a crucial role in securing ICSs. However, most commercial industrial …
devices, thus playing a crucial role in securing ICSs. However, most commercial industrial …