Defending Electrical Substations Against 0-Day Malware Through Decoy I/O in Protective Relays.
Julian L. RrushiPublished in: DASC/PiCom/DataCom/CyberSciTech (2017)
Keyphrases
- input output
- wireless networks
- malware detection
- transmission line
- file system
- power network
- reverse engineering
- power grid
- high voltage
- low voltage
- control flow
- detect malicious
- static analysis
- electronic devices
- main memory
- cellular networks
- electro mechanical
- electrical properties
- physical characteristics
- malicious code
- electrical energy
- computer engineering
- information security
- data transfer
- power distribution
- garbage collection
- distribution network
- dynamic analysis