Advanced-Intelligent Anomaly Detection System
Duration: 1 Oct 2017 to 30 Sept 2019
PI and Co-PI: Prof Aditya Mathur
Funding agency: National Research Foundation

2019

  1. Yoong Cheah Huei and Jonathan Heng, “Framework for Continuous System Security Protection in SWaT”, 2nd International Conference on Cyber Physical Systems and IoT (CPSIOT 2019), Mach 2019

2018

  1. Jonathan Heng and Yoong Cheah Huei, “Machine Learning Invariants to Detect Anomalies in Secure Water Treatment (SWaT)”, International Conference on Machine Learning and Communications Systems (ICMLCS 2019), January 2019, 21(1), Part I, pp. 129-136

 

Advancing Security of Public Infrastructure using Resilience and Economics
Duration: 1 Jan 2015 to 31 Dec 2019
PI and Co-PIs: Prof Aditya Mathur (PI), Assoc Prof Roland Bouffanais, Asst Prof Lingjie Duan, Prof Costas Courcoubetis, Asst Prof Stefano Galelli, Asst Prof Justin Ruths, Assoc Prof Jun Sun, Asst Prof Nils Ole Tippenhauer, Prof David Yau
Funding agency: National Research Foundation

2018

  1. Adepu S. and Mathur A., “Assessing the Effectiveness of Attack Detection at a Hackfest on Industrial Control Systems,” Special Issue on Sustainable Cyber Forensics and Threat Intelligence in IEEE Transactions on Sustainable Computing
  2. Adepu S., Kandasamy N. K., and Mathur A., “EPIC – An Electric Power Testbed for Research and Training in Cyber Physical Systems Security,” Industrial Control Systems & Of Cyber-Physical Systems (CyberICPS 2018) @ ESORICS 2018
  3. Adepu, S. and Mathur, A., “Distributed Attack Detection in a Water Treatment Plant: Method and Case Study,” IEEE Transactions on Dependable and Secure Computing (2018)
  4. Ahmed C. M., Ochoa M., Zhou J., Qadeer M., Murguia C., Ruths J., Mathur A., “NoisePrint – Attack Detection Using Sensor and Process Noise Fingerprint in Cyber Physical Systems,” ACM Asia Conference on Computer and Communications Security (ASIACCS) 2018
  5. Ahmed C. M., Zhou J., Mathur P. “Noise Matters: Using Sensor and Process Noise Fingerprint to Detect Stealthy Cyber Attacks and Authenticate sensors in CPS,” Annual Computer Security Applications Conference (ACSAC) 2018
  6. Antonioli D., Bernieri G., Tippenhauer N. O., “Taking Control: Design and Implementation of Botnets for Cyber-Physical Attacks with CPSBot” Asia CCM Conference on Computer & Communications Security 2018
  7. Chen Y., Poskitt C.M. , Sun J., “Learning from Mutants: Using Code Mutation to Learn and Monitor Cyber-Physical System Invariants,” IEEE Symposium on Security and Privacy 2018
  8. Douglas H. C., Taormina R., Galelli S., “Pressure-driven Modeling of Cyber-Physical Attacks on Water Distribution Systems,” Journal of Water Resources Planning and Management
  9. Jegourel C., Wang J., Sun J., “Importance Sampling of Interval Markov Chains,” IEEE/IFIP International Conference on Dependable Systems and Networks (DSN) 2018 
  10. Jegourel C., Sun J., and Dong J. S., “On the Sequential Massart Algorithm for Statistical Model Checking,” International Symposium On Leveraging Applications of Formal Methods, Verification and Validation (ISoLA) 2018
  11. Lin Q, Adepu S., Verwer S. and Mathur A., “TABOR – A Graphical Framework for Anomaly Detection in Industrial Control Systems,” ACM Asia Conference on Computer and Communications Security (ASIACCS) 2018
  12. Patlolla S. S., McMillin B., Adepu S., Mathur A., “An Approach for Formal Analysis of the Security of a Water Treatment Testbed,” 23rd IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2018)
  13. Shrivastava, S., Adepu, S., & Mathur, A. (2018). “Design and assessment of an Orthogonal Defense Mechanism for a water treatment facility,” Robotics and Autonomous Systems, 101, 114–125
  14. Siddiqi A., Tippenhauer N.O., Mashima D., Chen B., “Short Paper: On Practical Threat Scenario Testing in an Electric Power ICS Testbed,” 4th ACM Cyber‐Physical System Security Workshop (ACM CPSS’18)
  15. Taormina R. and Galelli S., “A Deep Learning Approach to the Detection and Localization of Cyber-Physical Attacks on Water Distribution Systems,” Journal of Water Resources Planning and Management, Volume 144 Issue 10 – October 2018
  16. R. Taormina, S. Galelli, H. C. Douglas, N.O. Tippenhauer, E. Salomons, and A. Ostfeld, “Modeling Cyber-Physical Attacks on Water Networks with epanetCPA,” 1st International WDSA / CCWI Joint Conference
  17. R. Taormina, S. Galelli, H.C. Douglas, N.O. Tippenhauer, E. Salomon & A. Ostfeld, “A Toolbox for Assessing the Impacts of Cyber-physical Attacks on Water Distribution Systems,” Journal of Environmental Modelling and Software
  18. Taormina R., Galelli S., Tippenhauer N. O., Salomons E., Ostfeld A., Eliades D. G. , Aghashahi M., Sundararajan R., Pourahmadi M., Banks M/ K., Brentan B. M. , Campbell E., Lima G., Manzi D., Ayala-Cabrera D., Herrera M., Montalvo I., Izquierdo J., Luvizotto Jr. E. , Chandy S. E., Rasekh A., Zachary A. B., Campbell B., Shafiee M. E. , Giacomoni M., Gatsis N., Taha A., Abokifa A. A. , Haddad K.,  Lo C. S., Biswas P., Pasha M. F. K. , Kc B. , Somasundaram S. L. , Housh M., Ohar Z., “The Battle of the Attack Detection Algorithms: Disclosing Cyber Attacks on Water Distribution Networks” Journal of Water Resources Planning and Management

2017

  1. Adepu S. and Mathur A., “Introducing Cyber Security at the Design Stage of Public Infrastructures: A Procedure and Case Study,” 2nd Asia Pacific Conference on Complex Systems Design and Management
  2. Adepu S. and Mathur A., “An Investigation into the Response of a Water Treatment System to Cyber Attacks,” The 17th IEEE International Symposium on High Assurance Systems Engineering (HASE) 2017
  3. Adepu S., and Mathur A., “From Design to Invariants: Detecting Attacks on Cyber Physical Systems”, 2017 IEEE International Conference on Software Quality, Reliability & Security
  4. Adepu S., Mishra G. and Mathur A., “Access Control in Water Distribution Networks: A Case Study”, 2017 IEEE International Conference on Software Quality, Reliability & Security
  5. Adepu S., Prakash J., and Mathur A., “WaterJam: An Experimental case study of Jamming Attacks on a Water Treatment System”, 2017 IEEE International Conference on Software Quality, Reliability & Security
  6. Ahmed C. M., Murguia C., Ruths J., “Model-based Attack Detection Scheme for Smart Water Distribution Networks”, ACM Asia Conference on Computer and Communications Security (ASIACCS) 2017
  7. Ahmed C. M. and Mathur A., “Hardware Identification via Sensor Fingerprinting in a Cyber Physical System”, 2017 IEEE International Conference on Software Quality, Reliability & Security
  8. Antonioli D., Ghaeini H. R., Adepu S., Ochoa M., and Tippenhauer N. O., “Gamifying ICS Security Training and Research: Design, Implementation, and Results of S3”, 3rd ACM Workshop on Cyber-Physical Systems Security and Privacy (CPS-SPC)
  9. Chamambaz M., Notarstefano G., Bouffanais R., “Randomized Constraints Consensus for Distributed Robust Linear Programming”, The 20th World Congress of the International Federation of Automatic Control, 9-14 July 2017
  10. Chamanbaz M., Notarstefano G., Bouffanais R., “A Distributed Ellipsoid Algorithm for Uncertain Convex Problems: A Randomized Approach,” 56th IEEE Conference on Decision and Control 2017
  11. Goh, Adepu S, Tan M. and Lee Z. S., ” Anomaly Detection in Cyber Physical Systems using Recurrent Neural Networks”, Workshop on Security issues in Cyber Physical Systems (SecCPS) @ HASE 2017
  12. Inoue J. , Yamagata Y., Chen Y., Poskitt C.M., and Sun J., “Anomaly Detection for a Water Treatment System Using Unsupervised Machine Learning,” IEEE International Conference on Data Mining Workshops: Data Mining for Cyberphysical and Industrial Systems (DMCIS 2017)
  13. Mathur A., “SecWater: A Multi-Layer Security Framework for Water Treatment Plants,” CySWATER ’17 Proceedings of the 3rd International Workshop on Cyber-Physical Systems for Smart Water Networks
  14. Murguia C., van de Wouw N., Ruths J., “Reachable Sets of Hidden CPS Sensor Attacks: Analysis and Synthesis Tools”, IFAC 2017 World Congress
  15. Pal K., Adepu S., Goh J., ” Effectiveness of Association Rules Mining for Invariants Generation in Cyber-Physical Systems “, The 18th IEEE International Symposium on High Assurance Systems Engineering (HASE) 2017
  16. Qadeer R., Murguia C., Ahmed C.M., and Ruths J., “Multistage Downstream Attack Detection in a Cyber Physical System,” CyberICPS Workshop 2017, in conjunction with ESORICS 2017
  17. Rocchetto M. and Tippenhauer N.O., “Towards Formal Security Analysis of Industrial Control Systems”, ACM Asia Conference on Computer and Communications Security (ASIACCS) 2017
  18. Sabaliauskaite G., Adepu S., “Integrating Six-Step Model with Information Flow Diagrams for Comprehensive Analysis of Cyber-Physical System Safety and Security”, The 18th IEEE International Symposium on High Assurance Systems Engineering (HASE) 2017
  19. Sugumar G. and Mathur A., “Testing the Effectiveness of Attack Detection Mechanisms in Industrial Control Systems”, 2017 IEEE International Conference on Software Quality, Reliability & Security
  20. Tan R., Nguyen H. H., Yau D. K. Y, “Collaborative Load Management with Safety Assurance in Smart Grids,” ACM Transactions on Cyber-Physical Systems
  21. Taormina R., Galelli S., “Real-time detection of cyber-physical attacks on water distribution systems using deep learning,” World Environmental & Water Resources Congress 2017
  22. Taormina R., Galelli S., Tippenhauer N. O., Salomons E., Ostfeld A., “Characterizing cyber-pysical attacks on water distribution systems,” Journal of Water Resources Planning and Management
  23. Umer A.M., Junejo K.N., Mathur A., and Adepu S., “Integrating design and data centric approaches to generate invariants for distributed attack detection,” 3rd ACM Workshop on CPS Security and Privacy
  24. Wang J., Sun J, Yuan Q. and Pang J., “Should We Learn Probabilistic Models for Model Checking? A New Approach and an Empirical Study,” 20th International Conference on Fundamental Approaches to Software Engineering (FASE) in ETAPS 2017

2016

  1. Adepu S. and Mathur A., “Detecting Multi-Point Attacks in a Water Treatment System Using Intermittent Control Actions,”Singapore Cyber Security R&D Conference (SG-CRC 2016)
  2. Adepu S. and Mathur A., “Generalized attacker and attack models for Cyber Physical Systems,” The 40th IEEE Computer Society International Conference on Computers, Software & Applications
  3. Adepu S. and Mathur A., “Distributed Detection of Single-Stage Multipoint Cyber Attacks in a Water Treatment Plan,” Asia CCS 2016
  4. Adepu S. and Mathur A., “Using Process Invariants to Detect Cyber Attacks on a Water Treatment System,” ICT Systems Security and Privacy Protection 2016
  5. Adepu S., Shrivastava S., and Mathur A., “Argus: An Orthogonal Defense Framework,” IEEE computing magazine, Cyber Physical Security and Privacy Joint Special issue with IEEE intelligent Systems
  6. Ahmed C. M., Adepu S., Mathur A., “Limitations of State Estimation Based Cyber Attack Detection Schemes in Industrial Control Systems,” Smart City Security and Privacy Workshop (SCSP-W) CPS Week 2016
  7. Chen Y., Poskitt C. M., and Sun J., “Towards Learning and Verifying Invariants of Cyber-Physical Systems by Code Mutation”, accepted at Formal Methods 2016
  8. Goh J., Adepu S., Junejo K. N., and Mathur A., “A Dataset to Support Research in the Design of Secure Water Treatment Systems,” The 11th International Conference on Critical Information Infrastructures Security
  9. Junejo K. N. and Yau D., “Data Driven Physical Modelling for Intrusion Detection in Cyber Physical Systems,” Singapore Cyber Security R&D Conference 2016
  10. Junejo K. N., Goh J., “Attack Detection and Classification in Cyber Physical Systems Using A Machine Learning Approach,” 2nd ACM Cyber-Physical System Security Workshop
  11. Murguia C. and Ruths J., “CUSUM and x2 Attack Detection of Compromised Sensors,” Multi-conference on Systems and Control 2016
  12. Murguia C. and Ruths J., “Characterization of a CUSUM Model-Based Sensor Attack Detector,” IEEE 55th Conference on Decision and Control
  13. Murguia C., Ruths J., Nijmeijer H., “Robust Network Synchronization of Time-Delayed Coupled Systems,” 6th IFAC International Workshop on Periodic Control Systems
  14. Rocchetto M. and Tippenhauer N. O., “CPDY: Extending the Dolev-Yao Attacker with Physical-Layer Interactions,” ICFEM 2016
  15. Rocchetto M. and Tippenhauer N. O., “On Attacker Models and Profiles for Cyber-Physical Systems,” ESORICS 2016 (European Symposium on Research in Computer Science)
  16. Sabaliauskaite G., Adepu S., Mathur A., “A Six-step Model For Safety and Security Analysis of Cyber-physical Systems,” International Conference on Critical Information Infrastructures Security 2016
  17. Taormina R., Galelli S., Tippenhauer N. O., Ostfeld A., “Assessing the effect of cyber-physical attacks on water distribution systems,” World Environmental & Water Resources Congress 2016
  18. Taormina R., Galelli S., Tippenhauer N. O., Salomons E., Ostfeld A., “Simulation of Cyber-Physical Attacks on Water Distribution Systems with EPANET,” Singapore Cyber Security R&D Conference 2016
  19. Wang J.Y., Sun J. and Qin S.Q., “Verifying Complex Systems Probabilistically through Learning, Abstraction and Refinement”, 22nd International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS)

2015

  1. Adepu S. and Mathur A., “An Agent-based Framework for Simulating and Analysing Attacks on CPS,” 15th International Conference on Algorithms and Architectures for Parallel Processing

 

Autonomous Vehicle Security
Duration: 22 Nov 16 – 21 May 2020
PI: Dr Giedre Sabaliauskaite
Funding agency: Ministry of Defence

2019

  1. Sabaliauskaite G., Liew L. S., Zhou F. and Cui J., “Designing Safe and Secure Mixed Traffic Systems,” Workshop on Security issues in Cyber-Physical System (SecCPS), in conjunction with IEEE HASE 2019

2018

  1. Cui J., Sabaliauskaite G., “US2: An Unified Safety and Security Analysis Method for Autonomous Vehicles,” Future of Information and Communication Conference (FICC) 2018
  2. Cui J., Lin Shen Liew L.S., Sabaliauskaite G., “A Review on Safety Failures, Security Attacks, and Available Countermeasures for Autonomous Vehicle,” Ad Hoc Networks, Special Issue on Recent advances on security and privacy in Intelligent Transportation Systems
  3. Sabaliauskaite G., Cui J., Liew L.S., “Integrating Autonomous Vehicle Safety and Security Using the Six-Step Model,” International Journal On Advances in Security
  4. Sabaliauskaite G., Cui J., Liew L.S., and Zhou F., “Modelling Safe and Secure Cooperative Intelligent Transport Systems,” 3rd Asia-Pacific Conference on Complex Systems Design and Management 2018
  5. Sabaliauskaite G, Cui J., Liew L. S., and Zhou F., “Integrated Safety and Cybersecurity Risk Analysis of Cooperative Intelligent Transport Systems,” 10th International Conference on Soft Computing and Intelligent Systems (SCIS&ISIS2018)

2017

  1. Cui J., Sabaliauskaite G., “How to Align the Safety and Security for Autonomous Vehicles?,” The Second International Conference on Cyber-Technologies and Cyber-Systems (CYBER) 2017
  2. Cui J., Sabaliauskaite G., “Integrating Autonomous Vehicle Safety and Security Using the Six-Step Model, ISO 26262, SAE J3061, and SAE J3016,” CYPHY: Security Issues and Solutions for Cyber-Physical Systems, The Second International Conference on Cyber-Technologies and Cyber-Systems (CYBER) 2017

 

Cyber Physical System Protection
Duration: 18 Oct 2013 to 17 Oct 2016
PI and Co-PIs: Prof Aditya Mathur (PI), Assoc Prof Yuen Chau, Asst Prof Martin Ochoa, Asst Prof Nils Ole Tippenhauer, Assoc Prof Jun Sun
Funding agency: Ministry of Defence

2017

  1. Li L., Jun S., and Dong J. S., “A Formal Specification and Verification Framework for Timed Security Protocols.” IEEE Transactions on Software Engineering, Issue 99
  2. Ochoa M., “Selective and Aggregated Authentication in Industrial Control Systems Networks”, NDSS 2017

2016

  1. Adepu S. and Mathur A., “An Investigation into the Response of a Water Treatment System to Cyber Attacks,” The 17th IEEE International Symposium on High Assurance Systems Engineering (HASE)
  2. Adepu S. and Mathur A., “Introducing Cyber Security at the Design Stage of Public Infrastructures: A Procedure and Case Study,” 2nd Asia Pacific Conference on Complex Systems Design and Management
  3. Adepu S. and Mathur A., “Using Process Invariants to Detect Cyber Attacks on a Water Treatment System,” ICT Systems Security and Privacy Protection 2016
  4. Adepu S. and Mathur A., “Detecting Multi-Point Attacks in a Water Treatment System Using Intermittent Control Actions,”Singapore Cyber Security R&D Conference (SG-CRC 2016)
  5. Adepu S. and Mathur A.,”Generalised attacker and attack models for Cyber Physical Systems,”, IEEE Computer Society International Conference on Computers, Software & Applications (COMPSAC 2016)
  6. Adepu S. Mathur A., Jackson D. and Kang E. “Model Based Security Analysis of a Water Treatment System,” 2nd International Workshop on Software Engineering for Smart Cyber-Physical Systems (SEsCPS’16)
  7. Adepu S., and Mathur A., “An Experimental Investigation into Detecting Cyber Attacks on a Water Treatment System Using Process Invariants,” 7th International Conference on Cyber-Physical Systems (ICCPS)
  8. Antonioli D., Agrawal A., Tippenhauer N. O., “Towards High Interaction Virutal ICS Honeypots-in-a-box”, CPS-SPC16 Workshop
  9. Kang E., Adepu S., Mathur A. and Jackson D., “Model Based Security Analysis of a  Water Treatment System”, SEsCPS 2016, ICSE Workshop
  10. Kong P., Li Y., Chen X., Sun J., Sun M. and Wang J., “Towards Concolic Testing for Hybrid Systems.” FM 2016
  11. Li Li, Jun Sun and Jin Song Dong., “Automated Verification of Timed Security Protocols with Clock Drift.” FM 2016
  12. Mathur A. and Tippenhauer N. O., “SWaT: Secure Water Treatment Testbed for Research and Training in the Design of Industrial Control Systems,” IEEE Computer Society International Conference on Computers, Software & Applications (COMPSAC 2016)
  13. Sabaliauskaite G., Adepu S., and Mathur A., “A six-step model for safety and security analysis of complex cyber-physical systems”, 11th International Conference on Critical Information Infrastructures Security
  14. Urbina D. I., Giraldo J., Cárdenas A. A., Tippenhauer N. O., Valente J., Faisal M., Ruths J., Candell R., and Sandberg H.,  “Limiting The Impact of Stealthy Attacks on Industrial Control Systems”, CCS 2016
  15. Urbina D., Giraldo J. and Cardenas A., Tippenhauer N. O., “Attacking Fieldbus Communications in ICS: Applications to the SWaT Testbed,” Singapore Cyber Security R&D Conference (SG-CRC 2016)

2015

  1. Dau S. H., Song W., Yuen C., “Secure Erasure Codes with Partial Decodability,” IEEE International Conference on Communications (ICC2015)
  2. Dau S. H., Song W., Yuen C., “Weakly secure MDS codes for simple multiple access networks,” IEEE International Symposium on Information Theory (IEEE ISIT 2015)
  3. Li Li, Jun Sun, Yang Liu, Jin Song Dong., “Verifying Parameterized Timed Security Protocols.” FM 2015: 342-359
  4. Sun Y., Li W., Song W., Yuen C., “False Data Injection Attacks with Local Topology Information against Linear State Estimation,” IEEE PES Innovative Smart Grid Technologies 2015 Asian Conference (IEEE ISGT-Asia 2015)
  5. Tan T. H., Sun J., Xue Y., Chen M., Dong J. S., Liu Y., “Optimizing Selection of Competing Features via Feedback-Directed Evolutionary Algorithms,” International Symposium on Software Testing and Analysis (ISSTA 2015)
  6. Yuen C., “Achievable Ergodic Secrecy Rate for MIMO SWIPT Wiretap Channels,” IEEE International Conference on Communications (IEEE ICC 2015)

2014

  1. Chen X., Lei L., Zhang H., Yuen C. “On the Secrecy Outage Capacity of Physical Layer Security in Large-Scale MIMO Relaying Systems with Imperfect CSI,” IEEE International Conference on Communications (IEEE ICC 2014)
  2. Chen X., Sun J. and Sun M., “A Hybrid Model of Connectors in Cyber-Physical Systems.” 16th International Conference on Formal Engineering Methods (ICFEM 2014)
  3. Chen X., Sun J., Sun M., “A Hybrid Model of Connectors in Cyber-Physical Systems,” ICFEM 2014: 59-74
  4. Dau S. H., Song W., Yuen C., “On Block Security of Regenerating Codes at the MBR Point for Distributed Storage Systems,” IEEE International Symposium on Information Theory (IEEE ISIT 2014)
  5. Dau S. H., Song W., Yuen C., “On Simple Multiple Access Networks,” IEEE Journal on Selected Topics in Communications, Nov 2014
  6. Hao J., Kang E., Jackson D., Sun J., “Adaptive Defending Strategy for Smart Grid Attacks.” SEGS@CCS 2014: 23-30
  7. Li L., Jun S., Liu Y., Dong J. S., “Practical Analysis Framework for Software-based Attestation Scheme.” 16th International Conference on Formal Engineering Methods (ICFEM 2014).
  8. Li L., Jun S., Liu Y., Dong J. S., “TAuth: Verifying Timed Security Protocols.” ICFEM 2014: 300-315
  9. Li L., Pang J., Liu Y., Jun S., Dong J. S., “Symbolic Analysis of an Electric Vehicle Charging Protocol.” ICECCS 2014: 11-18
  10. Sabaliauskaite G. and Mathur A., “Aligning Cyber-Physical System Safety and Security”, 1st Asia-Pacific Conference on Complex Systems Design & Management
  11. Yuen C., “On the Existence of MDS Codes Over Small Fields With Constrained Generator Matrices,” IEEE International Symposium on Information Theory (IEEE ISIT 2014)

 

Cyber Patrol
Duration: 1 Feb 15 to 31 Jul 16
PI and Co-PI: Prof Yuval Elovici
Funding agency: Ministry of Defence

2017

  1. Elovici Y., Toh, J., “Cyber Security Patrol – Detecting Fake and Vulnerable WiFi-Enabled Printers”,  The 32nd ACM Symposium on Applied Computing (ACM SAC) 2017, pp. 535- 542

 

Network Engineering Techniques for Wireless Security
Duration: 19 Feb 14 to 18 Aug 17
PI and Co-PI: Dr Jemin Lee / Assoc Prof Tony Quek (PI)
Funding agency: Ministry of Defence

2019

  1. T. Chan, J. Lee, J. Prakash, and T. Q. S. Quek, “Secret Group-Key Generation at Physical Layer for Multi- Antenna Mesh Topology,” IEEE Trans. Information Forensics, and Security, vol. 14, no. 1, pp. 18–33, Jan. 2019

2018

  1. P. Gope, J. Lee, and T. Q. S. Quek, “Lightweight and Practical Anonymous Authentication Protocol for RFID Systems using Physically Unclonable Functions, IEEE Trans. Information Forensics, and Security, vol. 13, no. 11, pp. 2831–2843, Nov. 2018
  2. R.-H. Hsu, J. Lee, T. Q. S. Quek, and J.-C. Chen, “GRAAD: Group Anonymous and Accountable D2D Communication in Mobile Networks,” IEEE Trans. Information Forensics, and Security, vol. 13, no. 2, pp. 449–464, Feb. 2018
  3. R.-H. Hsu, J. Lee, T. Q. S. Quek, and J.-C. Chen, “Reconfigurable Security: Edge Computing-based Framework for IoT,” IEEE Network Mag., vol. 32, no. 5, pp. 92–99, Oct. 2018

2017

  1. M.Zhao, J. Ryu, J. Lee, T. Q. S. Quek, and S. Feng, “Exploiting Trust Degree for Multiple-Antenna User Cooperation,” IEEE Transactions on Wireless Communications
  2. P.Gope, J. Lee, and T. Q. S. Quek, “Resilience of DoS Attacks in Designing Anonymous User Authentication Protocol for Wireless Sensor Networks,” IEEE Sensors Journal
  3. P.Gope, R.-H. Hsu, J. Lee, and T. Q. S. Quek, “Secure communication for D2D-aided fog computing: architecture, challenges, and solution,” IEEE Network
  4. P.Mohapatra, J. Lee, and T. Q. S. Quek, “Interference assisted secret key generation in discrete memoryless wiretap channel with public feedback,” IEEE Transactions on Information Forensics and Security
  5. J.Lee, J. Ryu, C. D. T. Thai, J. Wang, F. Wang, and T. Q. S. Quek, “Friends or foes – the design of confidential cooperative communication with untrustworthy relay,” IEEE Commun. Mag.
  6. R.-H. Hsu, J. Lee, T. Q. S. Quek, and J.-C. Chen, “ReSIoT: Reconfigurable security for IoT,” IEEE Wireless Communications

2016

  1. C.Cheng, J. Lee, T. Jiang, and T. Takagi, “Security analysis and improvements on two homomorphic authentication schemes for network coding,” IEEE Transactions on Information Forensics and Security, vol. 11, no. 5, pp. 993-1002, May 2016
  2. C.D. T. Thai, J. Lee, and T. Q. S. Quek, “Physical-layer secret key generation with colluding untrusted relays,” IEEE Transactions on Wireless Communications, vol. 15, no. 2, pp. 1517-1530, Feb. 2016
  3. J.Ryu, J. Lee, and T. Q. S. Quek, “Transmission strategy against opportunistic attack for MISO secure channels,” IEEE Communications Letters, vol. 20, no. 11, pp. 2304-2307, Nov. 2016
  4. J.Wang, J. Lee, and T. Q. S. Quek, “Best antenna placement for eavesdroppers: Distributed or co-located?,” IEEE Communications Letters, vol. 20, no. 9, pp. 1820-1823, Sep. 2016
  5. L.Q. Duy, T. Q. S. Quek, and J. Lee, “A game theoretic model for enabling honeypots in IoT networks,” in Proc. IEEE Int. Conf. Commun. (ICC), Kuala Lumper, Malaysia, May 2016
  6. L.Q. Duy, T. Q. S. Quek, J. Lee, S. Jin, and H. Zhu, “Deceptive attack and defense game in honeypot-enabled networks for the Internet of Things,” IEEE Internet of Things Journal, vol. 3, no. 6, pp. 1025-1035
  7. P.Mohapatra, C. R. Murthy, and J. Lee, “On the secrecy capacity region of the 2-user Z interference channel with unidirectional transmitter cooperation,” IEEE Transactions on Information Forensics and Security
  8. P.Mohapatra, N. Pappas, J. Lee, T. Q. S. Quek, and V. Angelakis, “Stability region of 2-user full-duplex broadcast channel with secrecy constraint,” in Proc. IEEE Int. Conf. Commun. (ICC), Kuala Lumper, Malaysia, May 2016
  9. J.Ryu, J. Lee, and T. Q. S. Quek, “Confidential cooperative communication with trust degree of potential eavesdroppers,” IEEE Transactions on Wireless Communications, vol. 15, no. 6, pp. 3823 – 3836, Jun. 2016

2015

  1. C.D. T. Thai, J. Lee, and T. Q. S. Quek, “Secret group key generation in physical layer for mesh topology” in Proc. IEEE Global Commun. Conf., San Diego, CA, Dec. 2015, pp. 1-6
  2. F.Wang, X. Yuan, J. Lee, and T. Q. S. Quek, “Wireless MIMO switching with trusted and untrusted relays: degrees of freedom perspective,” in Proc. IEEE Int. Conf. Commun., London, UK, Jun. 2015, pp. 1-6
  3. J.Ryu, J. Lee, and T. Q.S. Quek, “Trust-degree based beamforming for MISO cooperative communication system,” IEEE Communications Letters, vol. 19, no. 11, pp. 1957-1960, Nov. 2015
  4. J.Wang, J. Lee, F. Wang, and T. Q. S. Quek, “Jamming-aided secure communication in massive MIMO Rician channels,” IEEE Trans. Wireless Commun., vol. 14, no. 12, pp. 6854-6868, Dec. 2015
  5. Jong Yeol Ryu, Jemin Lee, and Tony Q. S. Quek, “Trust degree based beamforming for MISO cooperative communication system,” IEEE Communications Letters, vol. 19, no. 11, Nov. 2015
  6. R.Hsu, J. Lee, and T. Q. S. Quek, “Reliable and Privacy Preserving Secure D2D Communication in LTE-A,? in Proc. ACM Int. Conf. on Security and Privacy in Wireless and Mobile Networks, New York, NY, Jun. 2015
  7. S.-Y. Chang, J. Lee, and Y.-C. Hu, “Noah: Keyed noise flooding for wireless confidentiality,” in Proc. ACM Symposium on QoS and Security for Wireless and Mobile Networks (Q2SWinet), Cancun, Mexico, Nov. 2015, pp. 141- 148

2014

  1. C.D. T. Thai, J. Lee, C. Cheng, and T. Q. S. Quek, “Physical-layer secret key generation with untrusted relays” in Proc. IEEE Global Commun. Conf., Workshop on Trusted Communications with Physical Layer Security, Austin, TX, Dec. 2014, pp. 1–6
  2. J. Lee and T. Q. S. Quek, “Device-to-device communication in wireless mobile social networks,” in Proc. IEEE Semiannual Veh. Technol. Conf., Seoul, Korea, May 2014
  3. J. Wang, J. Lee, F. Wang, and T. Q. S. Quek, “Secure communication via jamming in massive MIMO Rician channels” in Proc. IEEE Global Commun. Conf., Workshop on Massive MIMO: From theory to practice, Austin, TX, Dec. 2014, pp. 1–6

 

Research & Security Innovation Lab for IoT
Duration: 14 Sep 15 to 13 Mar 19
PI and Co-PIs: Prof Yuval Elovici (PI), Asst Prof Martin Ochoa, Asst Prof Nils Ole Tippenhauer
Funding agency: Ministry of Defence

2019

  1. Tambe, A., Aung, Y., Sridharan, R., Ochoa, M., Tippenhauer, N., Shabati, A., Elovici, Y. “Detection of Threats to IoT Devices using Scalable VPN-forwarded Honeypots”, The 9th ACM Conference on Data and Application Security and Privacy, CODASPY 2019.
  2. Breitenbacher, D., Homoliak, I., Aung, Y., Tippenhauer, N., Elovici, Y., “HADES-IoT: A Practical Host-Based Anomaly Detection System for IoT Devices”, The 14th ACM ASIA Conference on Computer and Communications Security (ACM ASIACCS 2019) (accepted).

2018

  1. Meidan, Y., Bohadana, M., Mathov, Y., Mirsky, Y., Breitenbacher, D., Shabati, A., Elovici, Y. “N-BaIoT: Network-based Detection of IoT Botnet Attacks Using Deep Autoencoders”, IEEE Pervasive Computing, Special Issue – Securing the IoT (July/Sep 2018).
  2. Neeraj, K., Sachidananda, V., Setikere, S., Zhou, J. Elovici, Y., “SMuF: State Machine Based Mutational Fuzzing for Internet of Things”, the 13th edition of the International Conference on Critical Information Infrastructures Security, September 2018, (CRITIS 2018).
  3. Setikere, S., Sachidananda, V., Elovici, Y., “Out of Kilter: Holistic Exploitation of Denial of Service in Internet of Things”, 14th EAI International Conference on Security and Privacy in Communication Networks, Aug 2018.
  4. Siboni, S., Sachidananda, V., Meidan, Y., Bohadana, M., Shabatia, A., Elovici Y., “Security Testbed for Internet of Things Devices”, IEEE Transactions on Reliability, 2018.
  5. Sridharan, R., Maiti, R., Tippenhauer, N., “WADAC: Privacy-Preserving Anomaly Detectionand Attack Classificationon Wireless Traffic” 11th ACM Conference on Security and Privacy in Wireless and Mobile Networks 2018, Stockholm, Sweden, June 2018.  

2017

  1. Antonioli, D., Siby, S., Tippenhauer, N., “Practical Evaluation of Passive COTS Eavesdropping in 802.11b/n/ac WLAN”, International Conference on Cryptology and Network Security (CANS 2017)
  2. Guarnizo, J., Tambe, A., Bhunia, S., Ochoa, M., Tippenhauer, N., Shabtai, A., Elovici, Y., “SIPHON : Towards Scalable High-Interaction Physical Honeypots”,  3rd ACM Cyber-Physical System Security Workshop (CPSS 2017), pp. 57- 68
  3. Maiti, R., Siby, S.,  Sridharan, R., Tippenhauer, N., “Link-Layer Device Type Classification on Encrypted Wireless Traffic with COTS Radios”,  22nd European Symposium on Research in Computer Security (ESORICS), pp.247-264
  4. Meidan, Y., Bohadana, M., Shabati, A., Elovici, Y., Ochoa, M., Tippenhauer, N., Guarnizo, J.,D., “Poster: ProfilIoT: A Machines learning Approach for IoT Device Identification Based on Network Traffic Analysis”,  The 32nd ACM Symposium on Applied Computing (SAC 2017)
  5. Meidan, Y., Bohadana, M., Shabtai, A., Ochoa, M., Tippenhauer, N. O., Davis Guarnizo, J., Elovici, Y., “Detection of Unauthorized IoT Devices Using Machine Learning Techniques”, 2017, arXiv preprint arXiv:1709.04647
  6. Sachidananda, V., Toh, J., Siboni, S., Shabati, A., Elovici, Y., “Let the Cat Out of the Bag: A Holistic Approach Towards Security Analysis of the Internet of Things”  3rd International Workshop on IoT Privacy, Trust, and Security (IoTPTS), pp. 3-10
  7. Siby, S., Maiti, R., Tippenhauer, N.,  “IoTScanner: Detecting Privacy Threats in IoT Neighborhoods”, 3rd International Workshop on IoT Privacy, Trust, and Security (IoTPTS), pp. 23- 30
  8. Siby, S., Maiti, R., Tippenhauer, N., “IoTScanner: Detecting and Classifying Privacy Threats in IoT Neighborhoods”, submitted in arXiv, http://arxiv.org/abs/1701.05007. 

2016

  1. Sachidananda, V., Toh, J., Siboni, S., Shabatia, A., Elovici Y., “Poster: Towards Exposing Internet of Things: A Roadmap”, ACM Conference on Computer and Communications Security (CCS) 2016: 1820-1822
  2. Siboni, S., Shabatia, A., Tippenhauer, N., Lee, J., Elovici, Y., “Advanced Security Testbed Framework for Wearable IoT Devices”, ACM Transactions on Internet Technology (TOIT), 16(4): 26:1-26:25 (2016)

 

Security by Design for Interconnected Critical Infrastructures
Duration: 1 Apr 2016 to 30 Apr 2019
PI and Co-PI: Prof Aditya Mathur (PI), Assoc Prof Arlindo Silva
Funding agency: National Research Foundation

2019

  1. Cheng F., Palleti V. R, Mathur A., Chana D., “A Systematic Framework to Generate Invariant Rules for Anomaly Detection in Industrial Control Systems,” The Network and Distributed System Security Symposium (NDSS) 2019

2018

  1. de Winter C., Palleti V. R., Worm D., Kooij R., “Optimal Placement of Imperfect Water Quality Sensors in Water Distribution Networks,” Computers & Chemical Engineering
  2. V. R. Palleti, Victor J., Silva A., “A Contribution of Axiomatic Design Principles to the Analysis and Impact of Attacks on Critical Infrastructures,” International Journal of Critical Infrastructure Protection

2017

  1. Ahmed C. M., Reddy V., Mathur A., “WADI: A Water Distribution Testbed for Research in the Design of Secure Cyber Physical Systems”, 3rd International Workshop on Cyber-Physical Systems for Smart Water Networks (CySWater) 2017

 

 

Testing for Blockchain Security by Design
Duration: 1 Oct 2017 to 30 Sept 2019
PI and Co-PIs: Prof Aditya Mathur/ Asst Prof Pawel Szalachowski (PI), Asst Prof Georgios Piliouras and Assoc Prof Jun Sun
Funding agency: National Research Foundation

2019

  1. Vitalik Buterin, Daniel Reijsbergeny, Stefanos Leonardos, Georgios Piliouras, “Incentives in Ethereum’s Hybrid Casper Protocol”, IEEE International Conference on Blockchain and Cryptocurrency (ICBC 2019)
  2. Stefanos Leonardos, Daniel Reijsbergen, Georgios Piliouras, “Weighted Voting on the Blockchain: Improving Consensus in Proof of Stake Protocols”, IEEE International Conference on Blockchain and Cryptocurrency (ICBC 2019)
  3. Nikos Leonardos, Stefanos Leonardos, and Georgios Piliouras. Oceanic games: Centralization risks and incentives in blockchain mining, 1st International Conference on Mathematical Research for Blockchain Economy (MARBLE), 2019

2018

  1. Vincent Chia, Pieter Hartely, Qingze Humy, Sebastian Ma, Georgios Piliourasy, Daniel Reijsbergeny, Mark van Staalduinen, Pawel Szalachowskiy, “Rethinking Blockchain Security: Position Paper”, 2018 IEEE International Conference on Blockchain
  2. Pawel Szalachowski, “Towards More Reliable Bitcoin Timestamps”, 2018 Crypto Valley Conference on Blockchain Technology