Towards Useful Anomaly Detection for Back Office Networks
AbstractIn this paper we present a protocol-aware anomaly detection framework specifically designed for back office networks together with a new automatic method for feature selection that allows to...
View Article$$\mu $$ Shield
AbstractEmbedded devices are playing a major role in our way of life. Similar to other computer systems embedded devices are vulnerable to code-reuse attacks. Compromising these devices in a critical...
View ArticleStealth Low-Level Manipulation of Programmable Logic Controllers I/O by Pin...
AbstractInput/Output is the mechanism through which Programmable Logic Controllers (PLCs) interact with and control the outside world. Particularly when employed in critical infrastructures, the I/O of...
View ArticleFrom Intrusion Detection to Software Design
AbstractI believe the single most important reason why we are so helpless against cyber-attackers is that present systems are not supervisable. This opinion is developed in years spent working on...
View ArticleRole Inference + Anomaly Detection = Situational Awareness in BACnet Networks
AbstractIn smart buildings, cyber-physical components (e.g., controllers, sensors, and actuators) communicate with each other using network protocols such as BACnet. Many of these devices are now...
View ArticleLeveraging Semantics for Actionable Intrusion Detection in Building...
AbstractIn smart buildings, physical components (e.g., controllers, sensors, and actuators) are interconnected and communicate with each other using network protocols such as BACnet. Many smart...
View ArticleA Matter of Life and Death: Analyzing the Security of Healthcare Networks
AbstractHealthcare Delivery Organizations (HDOs) are complex institutions where a broad range of devices are interconnected. This inter-connectivity brings security concerns and we are observing an...
View ArticleDemonstration of new attacks on three healthcare network protocols in a lab...
AbstractHealthcare delivery organizations such as hospitals are complex infrastructures comprising a broad range of networked devices. They include connected medical devices which can deliver health...
View Article
More Pages to Explore .....