Stealthy attacks formalized as STL formulas for Falsification of CPS Security.
Aniruddh ChandratreTomas Hernandez AcostaTanmay KhandaitGiulia PedrielliGeorgios FainekosPublished in: HSCC (2023)
Keyphrases
- security threats
- security mechanisms
- security problems
- cyber attacks
- security protocols
- computer security
- security measures
- java card
- security breaches
- security vulnerabilities
- security issues
- security risks
- fault injection
- denial of service attacks
- information security
- security flaws
- chosen plaintext
- malicious users
- countermeasures
- intrusion detection
- stream cipher
- network security
- key management
- insider attacks
- cryptographic protocols
- security requirements
- secure routing
- malicious attacks
- access control
- biometric template
- cyber security
- security policies
- security management
- smart card
- intrusion detection and prevention
- buffer overflow
- information leakage
- cryptographic algorithms
- statistical databases
- computer networks
- attack detection
- defense mechanisms
- smart grid
- user authentication
- security analysis