Blind Concealment from Reconstruction-based Attack Detectors for Industrial Control Systems via Backdoor Attacks.
Tim WalitaAlessandro ErbaJohn Henry CastellanosNils Ole TippenhauerPublished in: CPSS@AsiaCCS (2023)
Keyphrases
- countermeasures
- control system
- attack detection
- malicious users
- cyber attacks
- malicious attacks
- critical infrastructure
- industrial automation
- differential power analysis
- denial of service attacks
- ddos attacks
- dos attacks
- attack scenarios
- data corruption
- network intrusions
- fault injection
- power analysis
- information security
- denial of service
- post processing
- block cipher
- object detection
- security measures
- network intrusion
- security risks
- normal traffic
- network attacks
- image reconstruction
- security vulnerabilities
- smart card
- injection attacks
- detecting malicious
- information leakage
- digital watermark
- intrusion detection system
- network security
- misuse detection
- industrial processes
- intrusion detection
- network traffic
- malicious activities
- normal behavior
- cyber security
- phishing attacks
- defense mechanisms
- error concealment
- digital image watermarking scheme
- malicious nodes