-
Notifications
You must be signed in to change notification settings - Fork 1
/
index.xml
838 lines (736 loc) · 40 KB
/
index.xml
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
678
679
680
681
682
683
684
685
686
687
688
689
690
691
692
693
694
695
696
697
698
699
700
701
702
703
704
705
706
707
708
709
710
711
712
713
714
715
716
717
718
719
720
721
722
723
724
725
726
727
728
729
730
731
732
733
734
735
736
737
738
739
740
741
742
743
744
745
746
747
748
749
750
751
752
753
754
755
756
757
758
759
760
761
762
763
764
765
766
767
768
769
770
771
772
773
774
775
776
777
778
779
780
781
782
783
784
785
786
787
788
789
790
791
792
793
794
795
796
797
798
799
800
801
802
803
804
805
806
807
808
809
810
811
812
813
814
815
816
817
818
819
820
821
822
823
824
825
826
827
828
829
830
831
832
833
834
835
836
837
838
<?xml version="1.0" encoding="utf-8" standalone="yes" ?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
<channel>
<title>SCy-Phy</title>
<link>https://scy-phy.net/</link>
<atom:link href="https://scy-phy.net/index.xml" rel="self" type="application/rss+xml" />
<description>SCy-Phy</description>
<generator>Source Themes Academic (https://sourcethemes.com/academic/)</generator><language>en-us</language><lastBuildDate>Sat, 01 Jun 2030 13:00:00 +0000</lastBuildDate>
<image>
<url>https://scy-phy.net/img/thumbnail.png</url>
<title>SCy-Phy</title>
<link>https://scy-phy.net/</link>
</image>
<item>
<title>Example Talk</title>
<link>https://scy-phy.net/talk/example/</link>
<pubDate>Sat, 01 Jun 2030 13:00:00 +0000</pubDate>
<guid>https://scy-phy.net/talk/example/</guid>
<description><p>Slides can be added in a few ways:</p>
<ul>
<li><strong>Create</strong> slides using Academic&rsquo;s
<a href="https://sourcethemes.com/academic/docs/managing-content/#create-slides" target="_blank" rel="noopener"><em>Slides</em></a> feature and link using <code>slides</code> parameter in the front matter of the talk file</li>
<li><strong>Upload</strong> an existing slide deck to <code>static/</code> and link using <code>url_slides</code> parameter in the front matter of the talk file</li>
<li><strong>Embed</strong> your slides (e.g. Google Slides) or presentation video on this page using
<a href="https://sourcethemes.com/academic/docs/writing-markdown-latex/" target="_blank" rel="noopener">shortcodes</a>.</li>
</ul>
<p>Further talk details can easily be added to this page using <em>Markdown</em> and $\rm \LaTeX$ math code.</p>
</description>
</item>
<item>
<title>Transparent TSN for Agnostic End-hosts via P4-based Traffic Characterization at Switches</title>
<link>https://scy-phy.net/publication/brulhart-2024/</link>
<pubDate>Tue, 01 Oct 2024 00:00:00 +0000</pubDate>
<guid>https://scy-phy.net/publication/brulhart-2024/</guid>
<description></description>
</item>
<item>
<title>Enabling Uncooperative Physical Localization in Cellular Networks</title>
<link>https://scy-phy.net/publication/oh-24-uncooperative/</link>
<pubDate>Mon, 01 Jan 2024 00:00:00 +0000</pubDate>
<guid>https://scy-phy.net/publication/oh-24-uncooperative/</guid>
<description></description>
</item>
<item>
<title>FieldFuzz: In Situ Blackbox Fuzzing of Proprietary Industrial Automation Runtimes via the Network</title>
<link>https://scy-phy.net/publication/bytes-23-ffuzz/</link>
<pubDate>Sun, 01 Oct 2023 00:00:00 +0000</pubDate>
<guid>https://scy-phy.net/publication/bytes-23-ffuzz/</guid>
<description></description>
</item>
<item>
<title>Blind Concealment from Reconstruction-based Attack Detectors for Industrial Control Systems via Backdoor Attacks</title>
<link>https://scy-phy.net/publication/walita-23-blind/</link>
<pubDate>Sat, 01 Jul 2023 00:00:00 +0000</pubDate>
<guid>https://scy-phy.net/publication/walita-23-blind/</guid>
<description></description>
</item>
<item>
<title>FetchBench: Systematic Identification and Characterization of Proprietary Prefetchers</title>
<link>https://scy-phy.net/publication/schluter-23-fetchbench/</link>
<pubDate>Sat, 01 Jul 2023 00:00:00 +0000</pubDate>
<guid>https://scy-phy.net/publication/schluter-23-fetchbench/</guid>
<description></description>
</item>
<item>
<title>Preventing Reverse Engineering of Control Programs in Industrial Control Systems</title>
<link>https://scy-phy.net/publication/banerjee-23-preventing/</link>
<pubDate>Sat, 01 Jul 2023 00:00:00 +0000</pubDate>
<guid>https://scy-phy.net/publication/banerjee-23-preventing/</guid>
<description></description>
</item>
<item>
<title>Get Your Cyber-Physical Tests Done! Data-Driven Vulnerability Assessment of Robotic Vehicle</title>
<link>https://scy-phy.net/publication/ding-23-robotic/</link>
<pubDate>Sun, 01 Jan 2023 00:00:00 +0000</pubDate>
<guid>https://scy-phy.net/publication/ding-23-robotic/</guid>
<description></description>
</item>
<item>
<title>Time sensitive networking security: issues of precision time protocol and its implementation</title>
<link>https://scy-phy.net/publication/berardi-23-time/</link>
<pubDate>Sun, 01 Jan 2023 00:00:00 +0000</pubDate>
<guid>https://scy-phy.net/publication/berardi-23-time/</guid>
<description></description>
</item>
<item>
<title>White-box Concealment Attacks Against Anomaly Detectors for Cyber-Physical Systems</title>
<link>https://scy-phy.net/publication/erba-23-whitebox/</link>
<pubDate>Sun, 01 Jan 2023 00:00:00 +0000</pubDate>
<guid>https://scy-phy.net/publication/erba-23-whitebox/</guid>
<description></description>
</item>
<item>
<title>Defense system and method against cyber-physical attacks</title>
<link>https://scy-phy.net/publication/mathur-2022-defense/</link>
<pubDate>Mon, 01 Aug 2022 00:00:00 +0000</pubDate>
<guid>https://scy-phy.net/publication/mathur-2022-defense/</guid>
<description></description>
</item>
<item>
<title>Hiding in Plain Sight? On the Efficacy of Power Side Channel-Based Control Flow Monitoring</title>
<link>https://scy-phy.net/publication/han-22-hiding/</link>
<pubDate>Mon, 01 Aug 2022 00:00:00 +0000</pubDate>
<guid>https://scy-phy.net/publication/han-22-hiding/</guid>
<description></description>
</item>
<item>
<title>Constrained Proximity Attacks on Mobile Targets</title>
<link>https://scy-phy.net/publication/wang-22-constrained/</link>
<pubDate>Tue, 01 Mar 2022 00:00:00 +0000</pubDate>
<guid>https://scy-phy.net/publication/wang-22-constrained/</guid>
<description></description>
</item>
<item>
<title>Assessing Model-free Anomaly Detection in Industrial Control Systems Against Generic Concealment Attacks</title>
<link>https://scy-phy.net/publication/erba-2022-modelfree/</link>
<pubDate>Sat, 01 Jan 2022 00:00:00 +0000</pubDate>
<guid>https://scy-phy.net/publication/erba-2022-modelfree/</guid>
<description></description>
</item>
<item>
<title>Blurtooth: Exploiting cross-transport key derivation in Bluetooth classic and Bluetooth low energy</title>
<link>https://scy-phy.net/publication/antonioli-22-blurtooth/</link>
<pubDate>Sat, 01 Jan 2022 00:00:00 +0000</pubDate>
<guid>https://scy-phy.net/publication/antonioli-22-blurtooth/</guid>
<description></description>
</item>
<item>
<title>Identifying Near-Optimal Single-Shot Attacks on ICSs with Limited Process Knowledge</title>
<link>https://scy-phy.net/publication/esquivel-2022-identifying/</link>
<pubDate>Sat, 01 Jan 2022 00:00:00 +0000</pubDate>
<guid>https://scy-phy.net/publication/esquivel-2022-identifying/</guid>
<description></description>
</item>
<item>
<title>Microarchitectural Leakage Templates and Their Application to Cache-Based Side Channels</title>
<link>https://scy-phy.net/publication/ibrahim-22-templates/</link>
<pubDate>Sat, 01 Jan 2022 00:00:00 +0000</pubDate>
<guid>https://scy-phy.net/publication/ibrahim-22-templates/</guid>
<description></description>
</item>
<item>
<title>Security Analysis of Vendor Implementations of the OPC UA Protocol for Industrial Control Systems</title>
<link>https://scy-phy.net/publication/erba-22-opcua/</link>
<pubDate>Sat, 01 Jan 2022 00:00:00 +0000</pubDate>
<guid>https://scy-phy.net/publication/erba-22-opcua/</guid>
<description></description>
</item>
<item>
<title>LIGHTBLUE: Automatic Profile-Aware Debloating of Bluetooth Stacks</title>
<link>https://scy-phy.net/publication/wu-21-lightblue/</link>
<pubDate>Sun, 01 Aug 2021 00:00:00 +0000</pubDate>
<guid>https://scy-phy.net/publication/wu-21-lightblue/</guid>
<description></description>
</item>
<item>
<title>Assessing the Use of Insecure ICS Protocols via IXP Network Traffic Analysis</title>
<link>https://scy-phy.net/publication/barbieri-21-assessing/</link>
<pubDate>Thu, 01 Jul 2021 00:00:00 +0000</pubDate>
<guid>https://scy-phy.net/publication/barbieri-21-assessing/</guid>
<description></description>
</item>
<item>
<title>Attack Detection for CPS</title>
<link>https://scy-phy.net/publication/tippenhauer-2021-detection/</link>
<pubDate>Fri, 01 Jan 2021 00:00:00 +0000</pubDate>
<guid>https://scy-phy.net/publication/tippenhauer-2021-detection/</guid>
<description></description>
</item>
<item>
<title>COTS Drone Detection using Video Streaming Characteristics</title>
<link>https://scy-phy.net/publication/alsoliman-21-drone/</link>
<pubDate>Fri, 01 Jan 2021 00:00:00 +0000</pubDate>
<guid>https://scy-phy.net/publication/alsoliman-21-drone/</guid>
<description></description>
</item>
<item>
<title>COTS Drone Detection Using Video Streaming Characteristics</title>
<link>https://scy-phy.net/publication/alsoliman-21-drones/</link>
<pubDate>Fri, 01 Jan 2021 00:00:00 +0000</pubDate>
<guid>https://scy-phy.net/publication/alsoliman-21-drones/</guid>
<description></description>
</item>
<item>
<title>vBump: Securing Ethernet-based Industrial Control System Networks with VLAN-based Traffic Aggregation</title>
<link>https://scy-phy.net/publication/tippenhauer-21-vbump/</link>
<pubDate>Fri, 01 Jan 2021 00:00:00 +0000</pubDate>
<guid>https://scy-phy.net/publication/tippenhauer-21-vbump/</guid>
<description></description>
</item>
<item>
<title>Constrained Concealment Attacks against Reconstruction-based Anomaly Detectors in Industrial Control Systems</title>
<link>https://scy-phy.net/publication/erba-2020-concealment/</link>
<pubDate>Mon, 07 Dec 2020 00:00:00 +0000</pubDate>
<guid>https://scy-phy.net/publication/erba-2020-concealment/</guid>
<description></description>
</item>
<item>
<title>Differential Analysis and Fingerprinting of ZombieLoads on Block Ciphers</title>
<link>https://scy-phy.net/publication/schlueter-20-differential/</link>
<pubDate>Wed, 18 Nov 2020 00:00:00 +0000</pubDate>
<guid>https://scy-phy.net/publication/schlueter-20-differential/</guid>
<description></description>
</item>
<item>
<title>A Statistical Analysis Framework for ICS Process Datasets</title>
<link>https://scy-phy.net/publication/turrin-20-analysis/</link>
<pubDate>Mon, 09 Nov 2020 00:00:00 +0000</pubDate>
<guid>https://scy-phy.net/publication/turrin-20-analysis/</guid>
<description></description>
</item>
<item>
<title>BIAS: Bluetooth Impersonation AttackS</title>
<link>https://scy-phy.net/publication/antonioli-20-bias/</link>
<pubDate>Mon, 18 May 2020 00:00:00 +0000</pubDate>
<guid>https://scy-phy.net/publication/antonioli-20-bias/</guid>
<description></description>
</item>
<item>
<title>Apparatus and method for monitoring a wireless network</title>
<link>https://scy-phy.net/publication/tippenhauer-20-apparatus/</link>
<pubDate>Sat, 01 Feb 2020 00:00:00 +0000</pubDate>
<guid>https://scy-phy.net/publication/tippenhauer-20-apparatus/</guid>
<description></description>
</item>
<item>
<title>Co-Simulating Physical Processes and Network Data for High-Fidelity Cyber-Security Experiments</title>
<link>https://scy-phy.net/publication/murillo-20-cosimulating/</link>
<pubDate>Wed, 01 Jan 2020 00:00:00 +0000</pubDate>
<guid>https://scy-phy.net/publication/murillo-20-cosimulating/</guid>
<description></description>
</item>
<item>
<title>Decentralized Privacy-Preserving Proximity Tracing</title>
<link>https://scy-phy.net/publication/troncoso-2020-decentralized/</link>
<pubDate>Wed, 01 Jan 2020 00:00:00 +0000</pubDate>
<guid>https://scy-phy.net/publication/troncoso-2020-decentralized/</guid>
<description></description>
</item>
<item>
<title>Key Negotiation Downgrade Attacks on Bluetooth and Bluetooth Low Energy</title>
<link>https://scy-phy.net/publication/antonioli-20-tops/</link>
<pubDate>Wed, 01 Jan 2020 00:00:00 +0000</pubDate>
<guid>https://scy-phy.net/publication/antonioli-20-tops/</guid>
<description></description>
</item>
<item>
<title>PAtt: Physics-based Attestation of Control Systems</title>
<link>https://scy-phy.net/publication/ghaeini-19-patt/</link>
<pubDate>Sun, 01 Sep 2019 00:00:00 +0000</pubDate>
<guid>https://scy-phy.net/publication/ghaeini-19-patt/</guid>
<description></description>
</item>
<item>
<title>The KNOB is Broken: Exploiting Low Entropy in the Encryption Key Negotiation Of Bluetooth BR/EDR</title>
<link>https://scy-phy.net/publication/antonioli-19-knob/</link>
<pubDate>Thu, 01 Aug 2019 00:00:00 +0000</pubDate>
<guid>https://scy-phy.net/publication/antonioli-19-knob/</guid>
<description></description>
</item>
<item>
<title>HADES-IoT: A Practical Host-Based Anomaly Detection System for IoT Devices</title>
<link>https://scy-phy.net/publication/breitenbacher-19-hades/</link>
<pubDate>Mon, 01 Jul 2019 00:00:00 +0000</pubDate>
<guid>https://scy-phy.net/publication/breitenbacher-19-hades/</guid>
<description></description>
</item>
<item>
<title>Hide and Seek: An Architecture for Improving Attack Visibility in Industrial Control Systems</title>
<link>https://scy-phy.net/publication/giraldo-19-hide/</link>
<pubDate>Sat, 01 Jun 2019 00:00:00 +0000</pubDate>
<guid>https://scy-phy.net/publication/giraldo-19-hide/</guid>
<description></description>
</item>
<item>
<title>Detection of Threats to IoT Devices using Scalable VPN-forwarded Honeypots</title>
<link>https://scy-phy.net/publication/tambe-19-vpn/</link>
<pubDate>Fri, 01 Mar 2019 00:00:00 +0000</pubDate>
<guid>https://scy-phy.net/publication/tambe-19-vpn/</guid>
<description></description>
</item>
<item>
<title>Nearby Threats: Reversing, Analyzing, and Attacking Google’s 'Nearby Connections' on Android</title>
<link>https://scy-phy.net/publication/antonioli-19-nearby/</link>
<pubDate>Fri, 01 Feb 2019 00:00:00 +0000</pubDate>
<guid>https://scy-phy.net/publication/antonioli-19-nearby/</guid>
<description></description>
</item>
<item>
<title>A toolbox for assessing the impacts of cyber-physical attacks on water distribution systems</title>
<link>https://scy-phy.net/publication/taormina-19-toolbox/</link>
<pubDate>Tue, 01 Jan 2019 00:00:00 +0000</pubDate>
<guid>https://scy-phy.net/publication/taormina-19-toolbox/</guid>
<description></description>
</item>
<item>
<title>Design and Realization of Testbeds for Security Research in the Industrial Internet of Things</title>
<link>https://scy-phy.net/publication/tippenhauer-2019-design/</link>
<pubDate>Tue, 01 Jan 2019 00:00:00 +0000</pubDate>
<guid>https://scy-phy.net/publication/tippenhauer-2019-design/</guid>
<description></description>
</item>
<item>
<title>Zero Residual Attacks on Industrial Control Systems and Stateful Countermeasures</title>
<link>https://scy-phy.net/publication/ghaeini-19-zera/</link>
<pubDate>Tue, 01 Jan 2019 00:00:00 +0000</pubDate>
<guid>https://scy-phy.net/publication/ghaeini-19-zera/</guid>
<description></description>
</item>
<item>
<title>Location Proximity Attacks against Mobile Targets: Analytical Bounds and Attacker Strategies</title>
<link>https://scy-phy.net/publication/wang-18-location/</link>
<pubDate>Sat, 01 Sep 2018 00:00:00 +0000</pubDate>
<guid>https://scy-phy.net/publication/wang-18-location/</guid>
<description></description>
</item>
<item>
<title>The Battle Of The Attack Detection Algorithms: Disclosing Cyber Attacks On Water Distribution Networks</title>
<link>https://scy-phy.net/publication/taormina-18-battle/</link>
<pubDate>Wed, 01 Aug 2018 00:00:00 +0000</pubDate>
<guid>https://scy-phy.net/publication/taormina-18-battle/</guid>
<description></description>
</item>
<item>
<title>A Survey of Physics-Based Attack Detection in Cyber-Physical Systems</title>
<link>https://scy-phy.net/publication/giraldo-18-survey/</link>
<pubDate>Sun, 01 Jul 2018 00:00:00 +0000</pubDate>
<guid>https://scy-phy.net/publication/giraldo-18-survey/</guid>
<description></description>
</item>
<item>
<title>On Practical Threat Scenario Testing in an Electric Power ICS Testbed</title>
<link>https://scy-phy.net/publication/siddiqi-18-epic/</link>
<pubDate>Fri, 01 Jun 2018 00:00:00 +0000</pubDate>
<guid>https://scy-phy.net/publication/siddiqi-18-epic/</guid>
<description></description>
</item>
<item>
<title>WADAC: Privacy-Preserving Anomaly Detection and Attack Classification on Wireless Traffic</title>
<link>https://scy-phy.net/publication/sridharan-18-detection/</link>
<pubDate>Fri, 01 Jun 2018 00:00:00 +0000</pubDate>
<guid>https://scy-phy.net/publication/sridharan-18-detection/</guid>
<description></description>
</item>
<item>
<title>Design and Large-Scale Evaluation of WiFi Proximity Metrics</title>
<link>https://scy-phy.net/publication/fakhreddine-18-proximity/</link>
<pubDate>Tue, 01 May 2018 00:00:00 +0000</pubDate>
<guid>https://scy-phy.net/publication/fakhreddine-18-proximity/</guid>
<description></description>
</item>
<item>
<title>State-Aware Anomaly Detection for Industrial Control Systems</title>
<link>https://scy-phy.net/publication/ghaeini-18-stateaware/</link>
<pubDate>Sun, 01 Apr 2018 00:00:00 +0000</pubDate>
<guid>https://scy-phy.net/publication/ghaeini-18-stateaware/</guid>
<description></description>
</item>
<item>
<title>Gamifying ICS Security Training and Research: Design, Implementation, and Results of S3</title>
<link>https://scy-phy.net/publication/antonioli-17-s-3/</link>
<pubDate>Wed, 01 Nov 2017 00:00:00 +0000</pubDate>
<guid>https://scy-phy.net/publication/antonioli-17-s-3/</guid>
<description></description>
</item>
<item>
<title>Practical Evaluation of Passive COTS Eavesdropping in 802.11b/n/ac WLAN</title>
<link>https://scy-phy.net/publication/antonioli-17-eavesdropping/</link>
<pubDate>Wed, 01 Nov 2017 00:00:00 +0000</pubDate>
<guid>https://scy-phy.net/publication/antonioli-17-eavesdropping/</guid>
<description></description>
</item>
<item>
<title>Link-Layer Device Type Classification on Encrypted Wireless Traffic with COTS Radios</title>
<link>https://scy-phy.net/publication/maiti-17-linklayer/</link>
<pubDate>Fri, 01 Sep 2017 00:00:00 +0000</pubDate>
<guid>https://scy-phy.net/publication/maiti-17-linklayer/</guid>
<description></description>
</item>
<item>
<title>On Ladder Logic Bombs in Industrial Control Systems</title>
<link>https://scy-phy.net/publication/govil-17-ladder/</link>
<pubDate>Fri, 01 Sep 2017 00:00:00 +0000</pubDate>
<guid>https://scy-phy.net/publication/govil-17-ladder/</guid>
<description></description>
</item>
<item>
<title>Legacy-Compliant Data Authentication for Industrial Control System Traffic</title>
<link>https://scy-phy.net/publication/castellanos-17-legacy/</link>
<pubDate>Sat, 01 Jul 2017 00:00:00 +0000</pubDate>
<guid>https://scy-phy.net/publication/castellanos-17-legacy/</guid>
<description></description>
</item>
<item>
<title>Messmanipulationen in Steuerungssystemen</title>
<link>https://scy-phy.net/publication/tippenhauer-17-digma/</link>
<pubDate>Sat, 01 Jul 2017 00:00:00 +0000</pubDate>
<guid>https://scy-phy.net/publication/tippenhauer-17-digma/</guid>
<description></description>
</item>
<item>
<title>IoTScanner: Detecting Privacy Threats in IoT Neighborhoods</title>
<link>https://scy-phy.net/publication/siby-17-iotscannershort/</link>
<pubDate>Sat, 01 Apr 2017 00:00:00 +0000</pubDate>
<guid>https://scy-phy.net/publication/siby-17-iotscannershort/</guid>
<description></description>
</item>
<item>
<title>ProfilIoT: A Machine Learning Approach for IoT Device Identification Based on Network Traffic Analysis (Poster)</title>
<link>https://scy-phy.net/publication/meidan-17-profiliot/</link>
<pubDate>Sat, 01 Apr 2017 00:00:00 +0000</pubDate>
<guid>https://scy-phy.net/publication/meidan-17-profiliot/</guid>
<description></description>
</item>
<item>
<title>SIPHON: Towards Scalable High-Interaction Physical Honeypots</title>
<link>https://scy-phy.net/publication/guarnizo-17-siphon/</link>
<pubDate>Sat, 01 Apr 2017 00:00:00 +0000</pubDate>
<guid>https://scy-phy.net/publication/guarnizo-17-siphon/</guid>
<description></description>
</item>
<item>
<title>Towards Formal Security Analysis of Industrial Control Systems</title>
<link>https://scy-phy.net/publication/towards-17-rocchetto/</link>
<pubDate>Sat, 01 Apr 2017 00:00:00 +0000</pubDate>
<guid>https://scy-phy.net/publication/towards-17-rocchetto/</guid>
<description></description>
</item>
<item>
<title>Evaluation of transport mode using wearable sensor data from 43,000 students</title>
<link>https://scy-phy.net/publication/wilhelm-17-evaluation/</link>
<pubDate>Sun, 01 Jan 2017 00:00:00 +0000</pubDate>
<guid>https://scy-phy.net/publication/wilhelm-17-evaluation/</guid>
<description></description>
</item>
<item>
<title>IoTScanner: Detecting and Classifying Privacy Threats in IoT Neighborhoods</title>
<link>https://scy-phy.net/publication/siby-17-iotscanner/</link>
<pubDate>Sun, 01 Jan 2017 00:00:00 +0000</pubDate>
<guid>https://scy-phy.net/publication/siby-17-iotscanner/</guid>
<description></description>
</item>
<item>
<title>Advanced Security Testbed Framework for Wearable IoT Devices</title>
<link>https://scy-phy.net/publication/siboni-16-testbed/</link>
<pubDate>Thu, 01 Dec 2016 00:00:00 +0000</pubDate>
<guid>https://scy-phy.net/publication/siboni-16-testbed/</guid>
<description></description>
</item>
<item>
<title>Multi-Receiver GPS Spoofing Detection: Error Models and Realization</title>
<link>https://scy-phy.net/publication/jansen-16-gps/</link>
<pubDate>Thu, 01 Dec 2016 00:00:00 +0000</pubDate>
<guid>https://scy-phy.net/publication/jansen-16-gps/</guid>
<description></description>
</item>
<item>
<title>Physical-Layer Integrity for Wireless Messages</title>
<link>https://scy-phy.net/publication/tippenhauer-16-integrity/</link>
<pubDate>Tue, 01 Nov 2016 00:00:00 +0000</pubDate>
<guid>https://scy-phy.net/publication/tippenhauer-16-integrity/</guid>
<description></description>
</item>
<item>
<title>Wearable Environmental Sensors and Infrastructure for Mobile Large-scale Urban Deployment</title>
<link>https://scy-phy.net/publication/wilhelm-16-wearable/</link>
<pubDate>Tue, 01 Nov 2016 00:00:00 +0000</pubDate>
<guid>https://scy-phy.net/publication/wilhelm-16-wearable/</guid>
<description></description>
</item>
<item>
<title>CPDY: Extending the Dolev-Yao Attacker with Physical-Layer Interactions</title>
<link>https://scy-phy.net/publication/rocchetto-16-cpdy/</link>
<pubDate>Sat, 01 Oct 2016 00:00:00 +0000</pubDate>
<guid>https://scy-phy.net/publication/rocchetto-16-cpdy/</guid>
<description></description>
</item>
<item>
<title>HAMIDS: Hierarchical Monitoring Intrusion Detection System for Industrial Control Systems</title>
<link>https://scy-phy.net/publication/ghaeini-16-hamids/</link>
<pubDate>Sat, 01 Oct 2016 00:00:00 +0000</pubDate>
<guid>https://scy-phy.net/publication/ghaeini-16-hamids/</guid>
<description></description>
</item>
<item>
<title>Limiting The Impact of Stealthy Attacks on Industrial Control Systems</title>
<link>https://scy-phy.net/publication/urbina-16-limiting/</link>
<pubDate>Sat, 01 Oct 2016 00:00:00 +0000</pubDate>
<guid>https://scy-phy.net/publication/urbina-16-limiting/</guid>
<description></description>
</item>
<item>
<title>Towards High-Interaction Virtual ICS Honeypots-in-a-Box</title>
<link>https://scy-phy.net/publication/antonioli-16-towards/</link>
<pubDate>Sat, 01 Oct 2016 00:00:00 +0000</pubDate>
<guid>https://scy-phy.net/publication/antonioli-16-towards/</guid>
<description></description>
</item>
<item>
<title>On Attacker Models and Profiles for Cyber-Physical Systems</title>
<link>https://scy-phy.net/publication/rocchetto-16-models/</link>
<pubDate>Thu, 01 Sep 2016 00:00:00 +0000</pubDate>
<guid>https://scy-phy.net/publication/rocchetto-16-models/</guid>
<description></description>
</item>
<item>
<title>The Right Tool for the Job: a Case for Common Input Scenarios for Security Assessment</title>
<link>https://scy-phy.net/publication/dong-16-cissa/</link>
<pubDate>Wed, 01 Jun 2016 00:00:00 +0000</pubDate>
<guid>https://scy-phy.net/publication/dong-16-cissa/</guid>
<description></description>
</item>
<item>
<title>Assessing the effect of cyber-physical attacks on water distribution systems</title>
<link>https://scy-phy.net/publication/taormina-16-assessing/</link>
<pubDate>Sun, 01 May 2016 00:00:00 +0000</pubDate>
<guid>https://scy-phy.net/publication/taormina-16-assessing/</guid>
<description></description>
</item>
<item>
<title>External Project</title>
<link>https://scy-phy.net/project/external-project/</link>
<pubDate>Wed, 27 Apr 2016 00:00:00 +0000</pubDate>
<guid>https://scy-phy.net/project/external-project/</guid>
<description></description>
</item>
<item>
<title>Internal Project</title>
<link>https://scy-phy.net/project/internal-project/</link>
<pubDate>Wed, 27 Apr 2016 00:00:00 +0000</pubDate>
<guid>https://scy-phy.net/project/internal-project/</guid>
<description><p>Lorem ipsum dolor sit amet, consectetur adipiscing elit. Duis posuere tellus ac convallis placerat. Proin tincidunt magna sed ex sollicitudin condimentum. Sed ac faucibus dolor, scelerisque sollicitudin nisi. Cras purus urna, suscipit quis sapien eu, pulvinar tempor diam. Quisque risus orci, mollis id ante sit amet, gravida egestas nisl. Sed ac tempus magna. Proin in dui enim. Donec condimentum, sem id dapibus fringilla, tellus enim condimentum arcu, nec volutpat est felis vel metus. Vestibulum sit amet erat at nulla eleifend gravida.</p>
<p>Nullam vel molestie justo. Curabitur vitae efficitur leo. In hac habitasse platea dictumst. Sed pulvinar mauris dui, eget varius purus congue ac. Nulla euismod, lorem vel elementum dapibus, nunc justo porta mi, sed tempus est est vel tellus. Nam et enim eleifend, laoreet sem sit amet, elementum sem. Morbi ut leo congue, maximus velit ut, finibus arcu. In et libero cursus, rutrum risus non, molestie leo. Nullam congue quam et volutpat malesuada. Sed risus tortor, pulvinar et dictum nec, sodales non mi. Phasellus lacinia commodo laoreet. Nam mollis, erat in feugiat consectetur, purus eros egestas tellus, in auctor urna odio at nibh. Mauris imperdiet nisi ac magna convallis, at rhoncus ligula cursus.</p>
<p>Cras aliquam rhoncus ipsum, in hendrerit nunc mattis vitae. Duis vitae efficitur metus, ac tempus leo. Cras nec fringilla lacus. Quisque sit amet risus at ipsum pharetra commodo. Sed aliquam mauris at consequat eleifend. Praesent porta, augue sed viverra bibendum, neque ante euismod ante, in vehicula justo lorem ac eros. Suspendisse augue libero, venenatis eget tincidunt ut, malesuada at lorem. Donec vitae bibendum arcu. Aenean maximus nulla non pretium iaculis. Quisque imperdiet, nulla in pulvinar aliquet, velit quam ultrices quam, sit amet fringilla leo sem vel nunc. Mauris in lacinia lacus.</p>
<p>Suspendisse a tincidunt lacus. Curabitur at urna sagittis, dictum ante sit amet, euismod magna. Sed rutrum massa id tortor commodo, vitae elementum turpis tempus. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Aenean purus turpis, venenatis a ullamcorper nec, tincidunt et massa. Integer posuere quam rutrum arcu vehicula imperdiet. Mauris ullamcorper quam vitae purus congue, quis euismod magna eleifend. Vestibulum semper vel augue eget tincidunt. Fusce eget justo sodales, dapibus odio eu, ultrices lorem. Duis condimentum lorem id eros commodo, in facilisis mauris scelerisque. Morbi sed auctor leo. Nullam volutpat a lacus quis pharetra. Nulla congue rutrum magna a ornare.</p>
<p>Aliquam in turpis accumsan, malesuada nibh ut, hendrerit justo. Cum sociis natoque penatibus et magnis dis parturient montes, nascetur ridiculus mus. Quisque sed erat nec justo posuere suscipit. Donec ut efficitur arcu, in malesuada neque. Nunc dignissim nisl massa, id vulputate nunc pretium nec. Quisque eget urna in risus suscipit ultricies. Pellentesque odio odio, tincidunt in eleifend sed, posuere a diam. Nam gravida nisl convallis semper elementum. Morbi vitae felis faucibus, vulputate orci placerat, aliquet nisi. Aliquam erat volutpat. Maecenas sagittis pulvinar purus, sed porta quam laoreet at.</p>
</description>
</item>
<item>
<title>SWaT: A Water Treatment Testbed for Research and Training on ICS Security</title>
<link>https://scy-phy.net/publication/mathur-16-swat/</link>
<pubDate>Fri, 01 Apr 2016 00:00:00 +0000</pubDate>
<guid>https://scy-phy.net/publication/mathur-16-swat/</guid>
<description></description>
</item>
<item>
<title>Water Treatment, Distribution, and Electric Power Testbeds for Research in the Design of Secure Interdependent Critical Infrastructures</title>
<link>https://scy-phy.net/publication/tippenhauer-16-testbeds/</link>
<pubDate>Fri, 01 Apr 2016 00:00:00 +0000</pubDate>
<guid>https://scy-phy.net/publication/tippenhauer-16-testbeds/</guid>
<description></description>
</item>
<item>
<title>Attacking Fieldbus Communications in ICS: Applications to the SWaT Testbed</title>
<link>https://scy-phy.net/publication/urbina-16-fieldbus/</link>
<pubDate>Fri, 01 Jan 2016 00:00:00 +0000</pubDate>
<guid>https://scy-phy.net/publication/urbina-16-fieldbus/</guid>
<description></description>
</item>
<item>
<title>Characterizing Cyber-Physical Attacks on Water Distribution Systems</title>
<link>https://scy-phy.net/publication/taormina-16-characterizing/</link>
<pubDate>Fri, 01 Jan 2016 00:00:00 +0000</pubDate>
<guid>https://scy-phy.net/publication/taormina-16-characterizing/</guid>
<description></description>
</item>
<item>
<title>SENSg: Large-Scale Deployment of Wearable Sensors for Trip and Transport Mode Logging</title>
<link>https://scy-phy.net/publication/wilhelm-16-sensg/</link>
<pubDate>Fri, 01 Jan 2016 00:00:00 +0000</pubDate>
<guid>https://scy-phy.net/publication/wilhelm-16-sensg/</guid>
<description></description>
</item>
<item>
<title>Simulation of Cyber-Physical Attacks on Water Distribution Systems with EPANET</title>
<link>https://scy-phy.net/publication/taormina-16-simulation/</link>
<pubDate>Fri, 01 Jan 2016 00:00:00 +0000</pubDate>
<guid>https://scy-phy.net/publication/taormina-16-simulation/</guid>
<description></description>
</item>
<item>
<title>MiniCPS: A toolkit for security research on CPS Networks</title>
<link>https://scy-phy.net/publication/antonioli-15-minicps/</link>
<pubDate>Thu, 01 Oct 2015 00:00:00 +0000</pubDate>
<guid>https://scy-phy.net/publication/antonioli-15-minicps/</guid>
<description></description>
</item>
<item>
<title>UWB Rapid-Bit-Exchange System for Distance Bounding</title>
<link>https://scy-phy.net/publication/tippenhauer-15-uwb/</link>
<pubDate>Mon, 01 Jun 2015 00:00:00 +0000</pubDate>
<guid>https://scy-phy.net/publication/tippenhauer-15-uwb/</guid>
<description></description>
</item>
<item>
<title>Automatic Generation of Security Argument Graphs</title>
<link>https://scy-phy.net/publication/tippenhauer-14-automatic/</link>
<pubDate>Sat, 01 Nov 2014 00:00:00 +0000</pubDate>
<guid>https://scy-phy.net/publication/tippenhauer-14-automatic/</guid>
<description></description>
</item>
<item>
<title>Visible light communication with flickering prevention</title>
<link>https://scy-phy.net/publication/giustiniano-2014-visible/</link>
<pubDate>Wed, 01 Oct 2014 00:00:00 +0000</pubDate>
<guid>https://scy-phy.net/publication/giustiniano-2014-visible/</guid>
<description></description>
</item>
<item>
<title>CyberSAGE: A Tool for Automatic Security Assessment of Cyber-Physical Systems</title>
<link>https://scy-phy.net/publication/vu-14-cybersage/</link>
<pubDate>Mon, 01 Sep 2014 00:00:00 +0000</pubDate>
<guid>https://scy-phy.net/publication/vu-14-cybersage/</guid>
<description></description>
</item>
<item>
<title>Delay Makes a Difference: Smart Grid Resilience Under Remote Meter Disconnect Attack</title>
<link>https://scy-phy.net/publication/temple-13-delay/</link>
<pubDate>Tue, 01 Oct 2013 00:00:00 +0000</pubDate>
<guid>https://scy-phy.net/publication/temple-13-delay/</guid>
<description></description>
</item>
<item>
<title>Go with the Flow: Toward Workflow-Oriented Security Assessment</title>
<link>https://scy-phy.net/publication/chen-13-flow/</link>
<pubDate>Tue, 01 Jan 2013 00:00:00 +0000</pubDate>
<guid>https://scy-phy.net/publication/chen-13-flow/</guid>
<description></description>
</item>
<item>
<title>On Limitations of Friendly Jamming for Confidentiality</title>
<link>https://scy-phy.net/publication/tippenhauer-2013-limitations/</link>
<pubDate>Tue, 01 Jan 2013 00:00:00 +0000</pubDate>
<guid>https://scy-phy.net/publication/tippenhauer-2013-limitations/</guid>
<description></description>
</item>
<item>
<title>Low-complexity Visible Light Networking with LED-to-LED communication</title>
<link>https://scy-phy.net/publication/giustiniano-12-low/</link>
<pubDate>Thu, 01 Nov 2012 00:00:00 +0000</pubDate>
<guid>https://scy-phy.net/publication/giustiniano-12-low/</guid>
<description></description>
</item>
<item>
<title>Physical-Layer Security Aspects of Wireless Localization</title>
<link>https://scy-phy.net/publication/tippenhauer-12-phd/</link>
<pubDate>Thu, 01 Mar 2012 00:00:00 +0000</pubDate>
<guid>https://scy-phy.net/publication/tippenhauer-12-phd/</guid>
<description></description>
</item>
<item>
<title>Design and Implementation of a Terrorist Fraud Resilient Distance Bounding System</title>
<link>https://scy-phy.net/publication/ranganathan-12-terrorist/</link>
<pubDate>Sun, 01 Jan 2012 00:00:00 +0000</pubDate>
<guid>https://scy-phy.net/publication/ranganathan-12-terrorist/</guid>
<description></description>
</item>
<item>
<title>Toys communicating with LEDs: Enabling toy cars interaction</title>
<link>https://scy-phy.net/publication/tippenhauer-2012-toys/</link>
<pubDate>Sun, 01 Jan 2012 00:00:00 +0000</pubDate>
<guid>https://scy-phy.net/publication/tippenhauer-2012-toys/</guid>
<description></description>
</item>
<item>
<title>Investigation of Signal and Message Manipulations on the Wireless Channel</title>
<link>https://scy-phy.net/publication/poepper-11-manipulations/</link>
<pubDate>Sat, 01 Jan 2011 00:00:00 +0000</pubDate>
<guid>https://scy-phy.net/publication/poepper-11-manipulations/</guid>
<description></description>
</item>
<item>
<title>On the Requirements for Successful GPS Spoofing Attacks</title>
<link>https://scy-phy.net/publication/tippenhauer-11-gps/</link>
<pubDate>Sat, 01 Jan 2011 00:00:00 +0000</pubDate>
<guid>https://scy-phy.net/publication/tippenhauer-11-gps/</guid>
<description></description>
</item>
<item>
<title>Integrity Regions: Authentication Through Presence in Wireless Networks</title>
<link>https://scy-phy.net/publication/capkun-tmc-10/</link>
<pubDate>Fri, 01 Jan 2010 00:00:00 +0000</pubDate>
<guid>https://scy-phy.net/publication/capkun-tmc-10/</guid>
<description></description>
</item>
<item>
<title>UWB Impulse Radio Based Distance Bounding</title>
<link>https://scy-phy.net/publication/kuhn-10-uwbdb/</link>
<pubDate>Fri, 01 Jan 2010 00:00:00 +0000</pubDate>
<guid>https://scy-phy.net/publication/kuhn-10-uwbdb/</guid>
<description></description>
</item>
<item>
<title>Attacks on Public WLAN-based Positioning</title>
<link>https://scy-phy.net/publication/tippenhauer-09-attacks/</link>
<pubDate>Thu, 01 Jan 2009 00:00:00 +0000</pubDate>
<guid>https://scy-phy.net/publication/tippenhauer-09-attacks/</guid>
<description></description>
</item>
<item>
<title>ID-based Secure Distance Bounding and Localization</title>
<link>https://scy-phy.net/publication/tippenhauer-09-idbased/</link>
<pubDate>Thu, 01 Jan 2009 00:00:00 +0000</pubDate>
<guid>https://scy-phy.net/publication/tippenhauer-09-idbased/</guid>
<description></description>
</item>
<item>
<title>iPhone and iPod location spoofing: Attacks on public WLAN-based positioning systems</title>
<link>https://scy-phy.net/publication/tippenhauer-2009-iphone/</link>
<pubDate>Thu, 01 Jan 2009 00:00:00 +0000</pubDate>
<guid>https://scy-phy.net/publication/tippenhauer-2009-iphone/</guid>
<description></description>
</item>
<item>
<title>Secure Ranging With Message Temporal Integrity</title>
<link>https://scy-phy.net/publication/tippenhauer-09-temp/</link>
<pubDate>Thu, 01 Jan 2009 00:00:00 +0000</pubDate>
<guid>https://scy-phy.net/publication/tippenhauer-09-temp/</guid>
<description></description>
</item>
<item>
<title>UWB-based Secure Ranging and Localization</title>
<link>https://scy-phy.net/publication/tippenhauer-08-uwbsr-tr/</link>
<pubDate>Tue, 01 Jan 2008 00:00:00 +0000</pubDate>
<guid>https://scy-phy.net/publication/tippenhauer-08-uwbsr-tr/</guid>
<description></description>
</item>
<item>
<title>Design and Cryptoanalysis of Multi-Precision Arithmetics on Smart Cards with SmartMIPS Architecture</title>
<link>https://scy-phy.net/publication/tippenhauer-07-smartmips/</link>
<pubDate>Mon, 01 Jan 2007 00:00:00 +0000</pubDate>
<guid>https://scy-phy.net/publication/tippenhauer-07-smartmips/</guid>
<description></description>
</item>
</channel>
</rss>