- Home
- Search Results
- Page 1 of 1
Search for: All records
-
Total Resources4
- Resource Type
-
40000
- Availability
-
40
- Author / Contributor
- Filter by Author / Creator
-
-
Iyer, R. (3)
-
Kalbarczyk, Z. (3)
-
Banerjee, S. (2)
-
Cui, S. (2)
-
Jha, S. (2)
-
Tsai, T. (2)
-
Chung, K (1)
-
Chung, Keywhan (1)
-
Iyer, Ravishankar K. (1)
-
Kalbarczyk, Zbigniew T. (1)
-
Kesavadas, T. (1)
-
Li, X. (1)
-
Tang, P. (1)
-
Zhu, Z. (1)
-
#Tyler Phillips, Kenneth E. (0)
-
#Willis, Ciara (0)
-
& Abreu-Ramos, E. D. (0)
-
& Abramson, C. I. (0)
-
& Abreu-Ramos, E. D. (0)
-
& Adams, S.G. (0)
-
- Filter by Editor
-
-
& Spizer, S. M. (0)
-
& . Spizer, S. (0)
-
& Ahn, J. (0)
-
& Bateiha, S. (0)
-
& Bosch, N. (0)
-
& Brennan K. (0)
-
& Brennan, K. (0)
-
& Chen, B. (0)
-
& Chen, Bodong (0)
-
& Drown, S. (0)
-
& Ferretti, F. (0)
-
& Higgins, A. (0)
-
& J. Peters (0)
-
& Kali, Y. (0)
-
& Ruiz-Arias, P.M. (0)
-
& S. Spitzer (0)
-
& Spitzer, S. (0)
-
& Spitzer, S.M. (0)
-
(submitted - in Review for IEEE ICASSP-2024) (0)
-
- (0)
-
-
Have feedback or suggestions for a way to improve these results?
!
Note: When clicking on a Digital Object Identifier (DOI) number, you will be taken to an external site maintained by the publisher.
Some full text articles may not yet be available without a charge during the embargo (administrative interval).
What is a DOI Number?
Some links on this page may take you to non-federal websites. Their policies may differ from this site.
-
Jha, S. ; Cui, S. ; Banerjee, S. ; Tsai, T. ; Kalbarczyk, Z. ; Iyer, R. ( , International Conference on Dependable Systems and Networks)
-
Chung, K ; Li, X. ; Tang, P. ; Zhu, Z. ; Kalbarczyk, Z. ; Iyer, R. ; Kesavadas, T. ( , RAID)
-
Chung, Keywhan ; Kalbarczyk, Zbigniew T. ; Iyer, Ravishankar K. ( , ACM/IEEE International Conference on Cyber-Physical Systems)In this paper, we demonstrate the feasibility of smart malware that advances state-of-the-art attacks by (i) indirectly attacking a computing infrastructure through a cyber-physical system (CPS) that manages the environment in which the computing enterprise operates, (ii) disguising its malicious actions as accidental failures, and (iii) self-learning attack strategies from cyber-physical system measurement data. We address all aspects of the malware, including the construction of the self-learning malware and the launch of a failure injection attack. We validate the attacks in a data-driven CPS simulation environment developed as part of this study.more » « less