Cyber‐physical attacks and defences in the smart grid: a survey
… physical (CP) security is emerging. This paper provides a comprehensive and systematic
review of the critical attack … Both types of attacks are within the scope of CP attacks discussed in …
review of the critical attack … Both types of attacks are within the scope of CP attacks discussed in …
A tutorial on physical security and side-channel attacks
F Koeune, FX Standaert - International School on Foundations of Security …, 2004 - Springer
… The context of a physical attack is the following: we consider a device capable of performing
… , the exact nature of which depends on the attack’s context. This can for example be the …
… , the exact nature of which depends on the attack’s context. This can for example be the …
A survey of network attacks on cyber-physical systems
… The main performance is as follows: 1) the monitor can detect the network physical attack if
… attacks if the monitoring signal was not clear, the monitor cannot detect or recognize attacks. …
… attacks if the monitoring signal was not clear, the monitor cannot detect or recognize attacks. …
Detecting cyber-physical attacks in CyberManufacturing systems with machine learning methods
… To learn this new vulnerability, the cyber-physical attacks is … on physical data is studied for
detecting cyber-physical attacks… malicious attack and CNC milling machine malicious attack. …
detecting cyber-physical attacks… malicious attack and CNC milling machine malicious attack. …
[LIVRE][B] Cyber-physical attacks: A growing invisible threat
G Loukas - 2015 - books.google.com
… physical attacks, we will consider as sensor any device that can gather information about its
physical … as actuator any device that can initiate a physical action in its environment (move a …
physical … as actuator any device that can initiate a physical action in its environment (move a …
Characterizing cyber-physical attacks on water distribution systems
… -physical attacks (CPAs) on the hydraulic behavior of water distribution systems. The framework
consists of an attack … ) that are potentially vulnerable to attacks, whereas the latter allows …
consists of an attack … ) that are potentially vulnerable to attacks, whereas the latter allows …
Petri net modeling of cyber-physical attacks on smart grid
TM Chen, JC Sanchez-Aarnoutse… - IEEE Transactions on …, 2011 - ieeexplore.ieee.org
… on attack modeling in Section II. Section III gives an overview of cyber and physical threats
… In Section IV, we describe how Petri nets can model coordinated cyber-physical attacks with …
… In Section IV, we describe how Petri nets can model coordinated cyber-physical attacks with …
Physical attacks and tamper resistance
S Skorobogatov - Introduction to Hardware Security and Trust, 2011 - Springer
… require protection against physical attacks or tamper resistance. These attacks assume that
a … The importance of protection against physical attacks is dictated by the amount of valuable …
a … The importance of protection against physical attacks is dictated by the amount of valuable …
A formal approach to cyber-physical attacks
… -physical attacks; (2) we define a threat model of cyber-physical attacks and provide the
means to assess attack tolerance/vulnerability with respect to a given attack; (3) we formalise …
means to assess attack tolerance/vulnerability with respect to a given attack; (3) we formalise …
Physical system consequences of unobservable state-and-topology cyber-physical attacks
J Zhang, L Sankar - IEEE Transactions on Smart Grid, 2016 - ieeexplore.ieee.org
… physical line outage and cyber attack to mask the physical … cyber-physical attacks in which
both physical and cyber topology … state-preserving line-maintaining attacks (ie, only topology …
both physical and cyber topology … state-preserving line-maintaining attacks (ie, only topology …