Quick Link to NSoE DeST-SCI publications 

Advanced-Intelligent Anomaly Detection System
Duration: 1 Oct 2017 to 30 Sept 2019
PI and Co-PI: Prof Aditya Mathur
Funding agency: National Research Foundation

2020

  1. Ahmed, Chuadhry Mujeeb, Gauthama Raman MR, and Aditya P. Mathur.” Challenges in Machine Learning based approaches for Real-Time Anomaly Detection in Industrial Control Systems.” Proceedings of the 6th ACM on Cyber-Physical System Security Workshop. 2020.
  2. M.R. Gauthama Raman, Wenjie Dong, Aditya Mathur, “Deep Autoencoders as Anomaly Detectors: Method and Case Study in a Distributed Water Treatment Plant,” Computers & Security(2020), doi: https://doi.org/10.1016/j.cose.2020.102055

2019

  1. Gauthama Raman M.R., Somu N., Mathur A.P. (2019) Anomaly Detection in Critical Infrastructure Using Probabilistic Neural Network. In: Shankar Sriram V., Subramaniyaswamy V., Sasikaladevi N., Zhang L., Batten L., Li G. (eds) Applications and Techniques in Information Security. ATIS 2019. Communications in Computer and Information Science, vol 1116. Springer, Singapore
  2. Yoong Cheah Huei and Jonathan Heng, “Framework for Continuous System Security Protection in SWaT”, 2nd International Conference on Cyber Physical Systems and IoT (CPSIOT 2019), Mach 2019

2018

  1. Jonathan Heng and Yoong Cheah Huei, “Machine Learning Invariants to Detect Anomalies in Secure Water Treatment (SWaT)”, International Conference on Machine Learning and Communications Systems (ICMLCS 2019), January 2019, 21(1), Part I, pp. 129-136

 

Advancing Security of Public Infrastructure using Resilience and Economics
Duration: 1 Jan 2015 to 31 Dec 2019
PI and Co-PIs: Prof Aditya Mathur (PI), Assoc Prof Roland Bouffanais, Asst Prof Lingjie Duan, Prof Costas Courcoubetis, Asst Prof Stefano Galelli, Asst Prof Justin Ruths, Assoc Prof Jun Sun, Asst Prof Nils Ole Tippenhauer, Prof David Yau
Funding agency: National Research Foundation

2019

  1. Adepu S., “Anomaly Detection and Avoidance in Cyber Physical Systems,” Resilience Week Symposium 2019
  2. Adepu S., Kandasamy N. K., Zhou J. and Mathur A., “Attacks on Smart Grid: Power Supply Interruption and Malicious Power Generation,” International Journal of Information Security, accepted for publication
  3. Adepu S. Kang E., Mathur A. P., “Challenges in Secure Engineering of Critical Infrastructure Systems,” Second International Workshop on Software Security from Design to Deployment (SEAD) 2019 @ 34th IEEE/ACM International Conference on Automated Software Engineering (ASE) 2019
  4. Chamanbaz M., Dabbene F. and Bouffanais R., “A Physics-Based Attack Detection Technique in Cyber-Physical Systems: A Model Predictive Control Co-Design Approach,” 2019 Australian & New Zealand Control Conference
  5. Chamanbaz M., Dabbene F., Lagoa C. M., “Probabilistically Robust AC Optimal Power Flow,” IEEE Transactions on Control of Network Systems, 05 June 2019
  6. Y. Chen, C.M. Poskitt, J. Sun, S. Adepu, and F. Zhang, “Learning-Guided Network Fuzzing for Testing Cyber-Physical System Defences,” 34th IEEE/ACM International Conference on Automated Software Engineering (ASE) 2019
  7. Kandasamy N. K., “An Investigation on Feasibility and Security for Cyber-attacks on Generator Synchronization Process,” IEEE Transactions on Industrial Informatics, Dec 2019
  8. Kandasamy N. K., “Prosumer Site Power Interruption Attacks: Exploiting the Reactive Power Control Feature in Smart Inverters,” IET Generation, Transmission and Distribution
    Kandasamy N. K., Sugumar G., “Cyber Attack Mitigation for Stationary Battery Systems using Physical Layer Security,” IEEE PES Innovative Smart Grid Technologies Europe (ISGT Europe 2020)
  9. Maw A., Adepu S. Mathur A., “ICS-BlockOpS: Blockchain for Operational Data Security in Industrial Control System,” Prevasive and Mobile Computing, Volume 59, October 2019
  10. Peng S., Kooij R., He Z, Mieghem P. V., “Quantifying the Robustness of Network Controllability,” 4th International Conference on System Reliability and Safety
  11. Pournaras E., Taormina R., Thapa M., Galelli S., Palleti V.R., Kooij R., “Cascading Failures in Interconnected Power-to-Water Networks,” Third ACM International Workshop on Critical Infrastructure Network Security (CINS) 2019
  12. Qin Lin Q., Verwer S., Kooij R., Mathur A., “Using Datasets from Industrial Control Systems for Cyber Security Research and Education,” 14th International Conference on Critical Information Infrastructures Security (CRITIS)
  13. Sugumar S. and Mathur A., “Assessment of a Method for Detecting Process,” 15th European Dependable Computing Conference (EDCC) 2019
  14. Taormina R., Galelli S., Salomons E., “A Real-time Response Mechanism to Cyber-physical Attacks on Water Distribution Systems,” 17th International Computing & Control for the Water Industry Conference 2019
  15. Taormina R., Galelli S., Douglas H.C. , Tippenhauer N.O. , Salomon E. & Ostfeld A., “A Toolbox for Assessing the Impacts of Cyber-physical Attacks on Water Distribution Systems,” Journal of Environmental Modelling and Software
  16. Tripathy N. S., Chamanbaz M. and Bouffanais R., “Robust Stabilization of Resource Limited Networked Control Systems Under Denial-of-Service Attack,” 58th IEEE Conference on Decision and Control

2018

  1. Adepu S. and Mathur A., “Assessing the Effectiveness of Attack Detection at a Hackfest on Industrial Control Systems,” Special Issue on Sustainable Cyber Forensics and Threat Intelligence in IEEE Transactions on Sustainable Computing
  2. Adepu S., Kandasamy N. K., and Mathur A., “EPIC – An Electric Power Testbed for Research and Training in Cyber Physical Systems Security,” Industrial Control Systems & Of Cyber-Physical Systems (CyberICPS 2018) @ ESORICS 2018
  3. Adepu, S. and Mathur, A., “Distributed Attack Detection in a Water Treatment Plant: Method and Case Study,” IEEE Transactions on Dependable and Secure Computing (2018)
  4. Ahmed C. M., Ochoa M., Zhou J., Qadeer M., Murguia C., Ruths J., Mathur A., “NoisePrint – Attack Detection Using Sensor and Process Noise Fingerprint in Cyber Physical Systems,” ACM Asia Conference on Computer and Communications Security (ASIACCS) 2018
  5. Ahmed C. M., Zhou J., Mathur P. “Noise Matters: Using Sensor and Process Noise Fingerprint to Detect Stealthy Cyber Attacks and Authenticate sensors in CPS,” Annual Computer Security Applications Conference (ACSAC) 2018
  6. Antonioli D., Bernieri G., Tippenhauer N. O., “Taking Control: Design and Implementation of Botnets for Cyber-Physical Attacks with CPSBot” Asia CCM Conference on Computer & Communications Security 2018
  7. Chen Y., Poskitt C.M. , Sun J., “Learning from Mutants: Using Code Mutation to Learn and Monitor Cyber-Physical System Invariants,” IEEE Symposium on Security and Privacy 2018
  8. Douglas H. C., Taormina R., Galelli S., “Pressure-driven Modeling of Cyber-Physical Attacks on Water Distribution Systems,” Journal of Water Resources Planning and Management
  9. Jegourel C., Wang J., Sun J., “Importance Sampling of Interval Markov Chains,” IEEE/IFIP International Conference on Dependable Systems and Networks (DSN) 2018 
  10. Jegourel C., Sun J., and Dong J. S., “On the Sequential Massart Algorithm for Statistical Model Checking,” International Symposium On Leveraging Applications of Formal Methods, Verification and Validation (ISoLA) 2018
  11. Lin Q, Adepu S., Verwer S. and Mathur A., “TABOR – A Graphical Framework for Anomaly Detection in Industrial Control Systems,” ACM Asia Conference on Computer and Communications Security (ASIACCS) 2018
  12. Patlolla S. S., McMillin B., Adepu S., Mathur A., “An Approach for Formal Analysis of the Security of a Water Treatment Testbed,” 23rd IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2018)
  13. Shrivastava, S., Adepu, S., & Mathur, A. (2018). “Design and assessment of an Orthogonal Defense Mechanism for a water treatment facility,” Robotics and Autonomous Systems, 101, 114–125
  14. Siddiqi A., Tippenhauer N.O., Mashima D., Chen B., “Short Paper: On Practical Threat Scenario Testing in an Electric Power ICS Testbed,” 4th ACM Cyber‐Physical System Security Workshop (ACM CPSS’18)
  15. Taormina R. and Galelli S., “A Deep Learning Approach to the Detection and Localization of Cyber-Physical Attacks on Water Distribution Systems,” Journal of Water Resources Planning and Management, Volume 144 Issue 10 – October 2018
  16. R. Taormina, S. Galelli, H. C. Douglas, N.O. Tippenhauer, E. Salomons, and A. Ostfeld, “Modeling Cyber-Physical Attacks on Water Networks with epanetCPA,” 1st International WDSA / CCWI Joint Conference
  17. R. Taormina, S. Galelli, H.C. Douglas, N.O. Tippenhauer, E. Salomon & A. Ostfeld, “A Toolbox for Assessing the Impacts of Cyber-physical Attacks on Water Distribution Systems,” Journal of Environmental Modelling and Software
  18. Taormina R., Galelli S., Tippenhauer N. O., Salomons E., Ostfeld A., Eliades D. G. , Aghashahi M., Sundararajan R., Pourahmadi M., Banks M/ K., Brentan B. M. , Campbell E., Lima G., Manzi D., Ayala-Cabrera D., Herrera M., Montalvo I., Izquierdo J., Luvizotto Jr. E. , Chandy S. E., Rasekh A., Zachary A. B., Campbell B., Shafiee M. E. , Giacomoni M., Gatsis N., Taha A., Abokifa A. A. , Haddad K.,  Lo C. S., Biswas P., Pasha M. F. K. , Kc B. , Somasundaram S. L. , Housh M., Ohar Z., “The Battle of the Attack Detection Algorithms: Disclosing Cyber Attacks on Water Distribution Networks” Journal of Water Resources Planning and Management

2017

  1. Adepu S. and Mathur A., “Introducing Cyber Security at the Design Stage of Public Infrastructures: A Procedure and Case Study,” 2nd Asia Pacific Conference on Complex Systems Design and Management
  2. Adepu S. and Mathur A., “An Investigation into the Response of a Water Treatment System to Cyber Attacks,” The 17th IEEE International Symposium on High Assurance Systems Engineering (HASE) 2017
  3. Adepu S., and Mathur A., “From Design to Invariants: Detecting Attacks on Cyber Physical Systems”, 2017 IEEE International Conference on Software Quality, Reliability & Security
  4. Adepu S., Mishra G. and Mathur A., “Access Control in Water Distribution Networks: A Case Study”, 2017 IEEE International Conference on Software Quality, Reliability & Security
  5. Adepu S., Prakash J., and Mathur A., “WaterJam: An Experimental case study of Jamming Attacks on a Water Treatment System”, 2017 IEEE International Conference on Software Quality, Reliability & Security
  6. Ahmed C. M., Murguia C., Ruths J., “Model-based Attack Detection Scheme for Smart Water Distribution Networks”, ACM Asia Conference on Computer and Communications Security (ASIACCS) 2017
  7. Ahmed C. M. and Mathur A., “Hardware Identification via Sensor Fingerprinting in a Cyber Physical System”, 2017 IEEE International Conference on Software Quality, Reliability & Security
  8. Antonioli D., Ghaeini H. R., Adepu S., Ochoa M., and Tippenhauer N. O., “Gamifying ICS Security Training and Research: Design, Implementation, and Results of S3”, 3rd ACM Workshop on Cyber-Physical Systems Security and Privacy (CPS-SPC)
  9. Chamambaz M., Notarstefano G., Bouffanais R., “Randomized Constraints Consensus for Distributed Robust Linear Programming”, The 20th World Congress of the International Federation of Automatic Control, 9-14 July 2017
  10. Chamanbaz M., Notarstefano G., Bouffanais R., “A Distributed Ellipsoid Algorithm for Uncertain Convex Problems: A Randomized Approach,” 56th IEEE Conference on Decision and Control 2017
  11. Goh, Adepu S, Tan M. and Lee Z. S., ” Anomaly Detection in Cyber Physical Systems using Recurrent Neural Networks”, Workshop on Security issues in Cyber Physical Systems (SecCPS) @ HASE 2017
  12. Inoue J. , Yamagata Y., Chen Y., Poskitt C.M., and Sun J., “Anomaly Detection for a Water Treatment System Using Unsupervised Machine Learning,” IEEE International Conference on Data Mining Workshops: Data Mining for Cyberphysical and Industrial Systems (DMCIS 2017)
  13. Mathur A., “SecWater: A Multi-Layer Security Framework for Water Treatment Plants,” CySWATER ’17 Proceedings of the 3rd International Workshop on Cyber-Physical Systems for Smart Water Networks
  14. Murguia C., van de Wouw N., Ruths J., “Reachable Sets of Hidden CPS Sensor Attacks: Analysis and Synthesis Tools”, IFAC 2017 World Congress
  15. Pal K., Adepu S., Goh J., ” Effectiveness of Association Rules Mining for Invariants Generation in Cyber-Physical Systems “, The 18th IEEE International Symposium on High Assurance Systems Engineering (HASE) 2017
  16. Qadeer R., Murguia C., Ahmed C.M., and Ruths J., “Multistage Downstream Attack Detection in a Cyber Physical System,” CyberICPS Workshop 2017, in conjunction with ESORICS 2017
  17. Rocchetto M. and Tippenhauer N.O., “Towards Formal Security Analysis of Industrial Control Systems”, ACM Asia Conference on Computer and Communications Security (ASIACCS) 2017
  18. Sabaliauskaite G., Adepu S., “Integrating Six-Step Model with Information Flow Diagrams for Comprehensive Analysis of Cyber-Physical System Safety and Security”, The 18th IEEE International Symposium on High Assurance Systems Engineering (HASE) 2017
  19. Sugumar G. and Mathur A., “Testing the Effectiveness of Attack Detection Mechanisms in Industrial Control Systems”, 2017 IEEE International Conference on Software Quality, Reliability & Security
  20. Tan R., Nguyen H. H., Yau D. K. Y, “Collaborative Load Management with Safety Assurance in Smart Grids,” ACM Transactions on Cyber-Physical Systems
  21. Taormina R., Galelli S., “Real-time detection of cyber-physical attacks on water distribution systems using deep learning,” World Environmental & Water Resources Congress 2017
  22. Taormina R., Galelli S., Tippenhauer N. O., Salomons E., Ostfeld A., “Characterizing cyber-pysical attacks on water distribution systems,” Journal of Water Resources Planning and Management
  23. Umer A.M., Junejo K.N., Mathur A., and Adepu S., “Integrating design and data centric approaches to generate invariants for distributed attack detection,” 3rd ACM Workshop on CPS Security and Privacy
  24. Wang J., Sun J, Yuan Q. and Pang J., “Should We Learn Probabilistic Models for Model Checking? A New Approach and an Empirical Study,” 20th International Conference on Fundamental Approaches to Software Engineering (FASE) in ETAPS 2017

2016

  1. Adepu S. and Mathur A., “Detecting Multi-Point Attacks in a Water Treatment System Using Intermittent Control Actions,”Singapore Cyber Security R&D Conference (SG-CRC 2016)
  2. Adepu S. and Mathur A., “Generalized attacker and attack models for Cyber Physical Systems,” The 40th IEEE Computer Society International Conference on Computers, Software & Applications
  3. Adepu S. and Mathur A., “Distributed Detection of Single-Stage Multipoint Cyber Attacks in a Water Treatment Plan,” Asia CCS 2016
  4. Adepu S. and Mathur A., “Using Process Invariants to Detect Cyber Attacks on a Water Treatment System,” ICT Systems Security and Privacy Protection 2016
  5. Adepu S., Shrivastava S., and Mathur A., “Argus: An Orthogonal Defense Framework,” IEEE computing magazine, Cyber Physical Security and Privacy Joint Special issue with IEEE intelligent Systems
  6. Ahmed C. M., Adepu S., Mathur A., “Limitations of State Estimation Based Cyber Attack Detection Schemes in Industrial Control Systems,” Smart City Security and Privacy Workshop (SCSP-W) CPS Week 2016
  7. Chen Y., Poskitt C. M., and Sun J., “Towards Learning and Verifying Invariants of Cyber-Physical Systems by Code Mutation”, accepted at Formal Methods 2016
  8. Goh J., Adepu S., Junejo K. N., and Mathur A., “A Dataset to Support Research in the Design of Secure Water Treatment Systems,” The 11th International Conference on Critical Information Infrastructures Security
  9. Junejo K. N. and Yau D., “Data Driven Physical Modelling for Intrusion Detection in Cyber Physical Systems,” Singapore Cyber Security R&D Conference 2016
  10. Junejo K. N., Goh J., “Attack Detection and Classification in Cyber Physical Systems Using A Machine Learning Approach,” 2nd ACM Cyber-Physical System Security Workshop
  11. Murguia C. and Ruths J., “CUSUM and x2 Attack Detection of Compromised Sensors,” Multi-conference on Systems and Control 2016
  12. Murguia C. and Ruths J., “Characterization of a CUSUM Model-Based Sensor Attack Detector,” IEEE 55th Conference on Decision and Control
  13. Murguia C., Ruths J., Nijmeijer H., “Robust Network Synchronization of Time-Delayed Coupled Systems,” 6th IFAC International Workshop on Periodic Control Systems
  14. Rocchetto M. and Tippenhauer N. O., “CPDY: Extending the Dolev-Yao Attacker with Physical-Layer Interactions,” ICFEM 2016
  15. Rocchetto M. and Tippenhauer N. O., “On Attacker Models and Profiles for Cyber-Physical Systems,” ESORICS 2016 (European Symposium on Research in Computer Science)
  16. Sabaliauskaite G., Adepu S., Mathur A., “A Six-step Model For Safety and Security Analysis of Cyber-physical Systems,” International Conference on Critical Information Infrastructures Security 2016
  17. Taormina R., Galelli S., Tippenhauer N. O., Ostfeld A., “Assessing the effect of cyber-physical attacks on water distribution systems,” World Environmental & Water Resources Congress 2016
  18. Taormina R., Galelli S., Tippenhauer N. O., Salomons E., Ostfeld A., “Simulation of Cyber-Physical Attacks on Water Distribution Systems with EPANET,” Singapore Cyber Security R&D Conference 2016
  19. Wang J.Y., Sun J. and Qin S.Q., “Verifying Complex Systems Probabilistically through Learning, Abstraction and Refinement”, 22nd International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS)

2015

  1. Adepu S. and Mathur A., “An Agent-based Framework for Simulating and Analysing Attacks on CPS,” 15th International Conference on Algorithms and Architectures for Parallel Processing

 

Autonomous Vehicle Security
Duration: 22 Nov 2016 – 21 May 2020
PI: Dr Giedre Sabaliauskaite
Funding agency: Ministry of Defence

2019

  1. Bryans J., Liew L. S., Nguyen H. N., Sabaliauskaite G., Shaikh S., and Zhou F., “A Template-based Method for the Generation of Attack Trees,” 13th WISTP International Conference on Information Security Theory and Practice (WISTP’2019)
  2. Cui J., Sabaliauskaite G., Liew L. S., Zhou F. and Zhang B., “Collaborative Analysis Framework of Safety and Security for Autonomous Vehicles,” in IEEE Access, vol. 7, pp. 148672-148683, 2019. doi: 10.1109/ACCESS.2019.2946632
  3. Sabaliauskaite G, Liew L. S., Zhou F., “AVES – Automated Vehicle Safety and Security Analysis Framework,” ACM Computer Science in Cars Symposium (CSCS 2019). Future Challenges in Artificial Intelligence & Security for Autonomous Vehicles

2018

  1. Cui J., Sabaliauskaite G., “US2: An Unified Safety and Security Analysis Method for Autonomous Vehicles,” Future of Information and Communication Conference (FICC) 2018
  2. Cui J., Lin Shen Liew L.S., Sabaliauskaite G., “A Review on Safety Failures, Security Attacks, and Available Countermeasures for Autonomous Vehicle,” Ad Hoc Networks, Special Issue on Recent advances on security and privacy in Intelligent Transportation Systems
  3. Sabaliauskaite G., Cui J., Liew L.S., “Integrating Autonomous Vehicle Safety and Security Using the Six-Step Model,” International Journal On Advances in Security
  4. Sabaliauskaite G., Cui J., Liew L.S., and Zhou F., “Modelling Safe and Secure Cooperative Intelligent Transport Systems,” 3rd Asia-Pacific Conference on Complex Systems Design and Management 2018
  5. Sabaliauskaite G, Cui J., Liew L. S., and Zhou F., “Integrated Safety and Cybersecurity Risk Analysis of Cooperative Intelligent Transport Systems,” 10th International Conference on Soft Computing and Intelligent Systems (SCIS&ISIS2018)
  6. Sabaliauskaite G., Liew L. S., Zhou F. and Cui J., “Designing Safe and Secure Mixed Traffic Systems,” Workshop on Security issues in Cyber-Physical System (SecCPS), in conjunction with IEEE HASE 2019

2017

  1. Cui J., Sabaliauskaite G., “How to Align the Safety and Security for Autonomous Vehicles?,” The Second International Conference on Cyber-Technologies and Cyber-Systems (CYBER) 2017
  2. Cui J., Sabaliauskaite G., “Integrating Autonomous Vehicle Safety and Security Using the Six-Step Model, ISO 26262, SAE J3061, and SAE J3016,” CYPHY: Security Issues and Solutions for Cyber-Physical Systems, The Second International Conference on Cyber-Technologies and Cyber-Systems (CYBER) 2017

 

Cyber Physical System Protection
Duration: 18 Oct 2013 to 17 Oct 2016
PI and Co-PIs: Prof Aditya Mathur (PI), Assoc Prof Yuen Chau, Asst Prof Martin Ochoa, Asst Prof Nils Ole Tippenhauer, Assoc Prof Jun Sun
Funding agency: Ministry of Defence

2017

  1. Li L., Jun S., and Dong J. S., “A Formal Specification and Verification Framework for Timed Security Protocols.” IEEE Transactions on Software Engineering, Issue 99
  2. Castellanos J. H., Antonioli D.,Tippenhauer N. O., Ochoa M., “Legacy-Compliant Data Authentication for Industrial Control System Traffic”, International Conference on Applied Cryptography and Network Security (ACNS) 2017

2016

  1. Adepu S. and Mathur A., “An Investigation into the Response of a Water Treatment System to Cyber Attacks,” The 17th IEEE International Symposium on High Assurance Systems Engineering (HASE)
  2. Adepu S. and Mathur A., “Introducing Cyber Security at the Design Stage of Public Infrastructures: A Procedure and Case Study,” 2nd Asia Pacific Conference on Complex Systems Design and Management
  3. Adepu S. and Mathur A., “Using Process Invariants to Detect Cyber Attacks on a Water Treatment System,” ICT Systems Security and Privacy Protection 2016
  4. Adepu S. and Mathur A., “Detecting Multi-Point Attacks in a Water Treatment System Using Intermittent Control Actions,”Singapore Cyber Security R&D Conference (SG-CRC 2016)
  5. Adepu S. and Mathur A.,”Generalised attacker and attack models for Cyber Physical Systems,”, IEEE Computer Society International Conference on Computers, Software & Applications (COMPSAC 2016)
  6. Adepu S. Mathur A., Jackson D. and Kang E. “Model Based Security Analysis of a Water Treatment System,” 2nd International Workshop on Software Engineering for Smart Cyber-Physical Systems (SEsCPS’16)
  7. Adepu S., and Mathur A., “An Experimental Investigation into Detecting Cyber Attacks on a Water Treatment System Using Process Invariants,” 7th International Conference on Cyber-Physical Systems (ICCPS)
  8. Antonioli D., Agrawal A., Tippenhauer N. O., “Towards High Interaction Virutal ICS Honeypots-in-a-box”, CPS-SPC16 Workshop
  9. Kang E., Adepu S., Mathur A. and Jackson D., “Model Based Security Analysis of a  Water Treatment System”, SEsCPS 2016, ICSE Workshop
  10. Kong P., Li Y., Chen X., Sun J., Sun M. and Wang J., “Towards Concolic Testing for Hybrid Systems.” FM 2016
  11. Li Li, Jun Sun and Jin Song Dong., “Automated Verification of Timed Security Protocols with Clock Drift.” FM 2016
  12. Mathur A. and Tippenhauer N. O., “SWaT: Secure Water Treatment Testbed for Research and Training in the Design of Industrial Control Systems,” IEEE Computer Society International Conference on Computers, Software & Applications (COMPSAC 2016)
  13. Sabaliauskaite G., Adepu S., and Mathur A., “A six-step model for safety and security analysis of complex cyber-physical systems”, 11th International Conference on Critical Information Infrastructures Security
  14. Urbina D. I., Giraldo J., Cárdenas A. A., Tippenhauer N. O., Valente J., Faisal M., Ruths J., Candell R., and Sandberg H.,  “Limiting The Impact of Stealthy Attacks on Industrial Control Systems”, CCS 2016
  15. Urbina D., Giraldo J. and Cardenas A., Tippenhauer N. O., “Attacking Fieldbus Communications in ICS: Applications to the SWaT Testbed,” Singapore Cyber Security R&D Conference (SG-CRC 2016)

2015

  1. Dau S. H., Song W., Yuen C., “Secure Erasure Codes with Partial Decodability,” IEEE International Conference on Communications (ICC2015)
  2. Dau S. H., Song W., Yuen C., “Weakly secure MDS codes for simple multiple access networks,” IEEE International Symposium on Information Theory (IEEE ISIT 2015)
  3. Li Li, Jun Sun, Yang Liu, Jin Song Dong., “Verifying Parameterized Timed Security Protocols.” FM 2015: 342-359
  4. Sun Y., Li W., Song W., Yuen C., “False Data Injection Attacks with Local Topology Information against Linear State Estimation,” IEEE PES Innovative Smart Grid Technologies 2015 Asian Conference (IEEE ISGT-Asia 2015)
  5. Tan T. H., Sun J., Xue Y., Chen M., Dong J. S., Liu Y., “Optimizing Selection of Competing Features via Feedback-Directed Evolutionary Algorithms,” International Symposium on Software Testing and Analysis (ISSTA 2015)
  6. Yuen C., “Achievable Ergodic Secrecy Rate for MIMO SWIPT Wiretap Channels,” IEEE International Conference on Communications (IEEE ICC 2015)

2014

  1. Chen X., Lei L., Zhang H., Yuen C. “On the Secrecy Outage Capacity of Physical Layer Security in Large-Scale MIMO Relaying Systems with Imperfect CSI,” IEEE International Conference on Communications (IEEE ICC 2014)
  2. Chen X., Sun J. and Sun M., “A Hybrid Model of Connectors in Cyber-Physical Systems.” 16th International Conference on Formal Engineering Methods (ICFEM 2014)
  3. Chen X., Sun J., Sun M., “A Hybrid Model of Connectors in Cyber-Physical Systems,” ICFEM 2014: 59-74
  4. Dau S. H., Song W., Yuen C., “On Block Security of Regenerating Codes at the MBR Point for Distributed Storage Systems,” IEEE International Symposium on Information Theory (IEEE ISIT 2014)
  5. Dau S. H., Song W., Yuen C., “On Simple Multiple Access Networks,” IEEE Journal on Selected Topics in Communications, Nov 2014
  6. Hao J., Kang E., Jackson D., Sun J., “Adaptive Defending Strategy for Smart Grid Attacks.” SEGS@CCS 2014: 23-30
  7. Li L., Jun S., Liu Y., Dong J. S., “Practical Analysis Framework for Software-based Attestation Scheme.” 16th International Conference on Formal Engineering Methods (ICFEM 2014).
  8. Li L., Jun S., Liu Y., Dong J. S., “TAuth: Verifying Timed Security Protocols.” ICFEM 2014: 300-315
  9. Li L., Pang J., Liu Y., Jun S., Dong J. S., “Symbolic Analysis of an Electric Vehicle Charging Protocol.” ICECCS 2014: 11-18
  10. Sabaliauskaite G. and Mathur A., “Aligning Cyber-Physical System Safety and Security”, 1st Asia-Pacific Conference on Complex Systems Design & Management
  11. Yuen C., “On the Existence of MDS Codes Over Small Fields With Constrained Generator Matrices,” IEEE International Symposium on Information Theory (IEEE ISIT 2014)

 

Cyber Patrol
Duration: 1 Feb 15 to 31 Jul 16
PI: Prof Yuval Elovici
Funding agency: Ministry of Defence

2017

  1. Elovici Y., Toh, J., “Cyber Security Patrol – Detecting Fake and Vulnerable WiFi-Enabled Printers”,  The 32nd ACM Symposium on Applied Computing (ACM SAC) 2017, pp. 535- 542

 

Network Engineering Techniques for Wireless Security
Duration: 19 Feb 2014 to 18 Aug 2017
PI and Co-PI: Dr Jemin Lee / Assoc Prof Tony Quek (PI)
Funding agency: Ministry of Defence

2019

  1. T. Chan, J. Lee, J. Prakash, and T. Q. S. Quek, “Secret Group-Key Generation at Physical Layer for Multi- Antenna Mesh Topology,” IEEE Trans. Information Forensics, and Security, vol. 14, no. 1, pp. 18–33, Jan. 2019

2018

  1. P. Gope, J. Lee, and T. Q. S. Quek, “Lightweight and Practical Anonymous Authentication Protocol for RFID Systems using Physically Unclonable Functions, IEEE Trans. Information Forensics, and Security, vol. 13, no. 11, pp. 2831–2843, Nov. 2018
  2. R.-H. Hsu, J. Lee, T. Q. S. Quek, and J.-C. Chen, “GRAAD: Group Anonymous and Accountable D2D Communication in Mobile Networks,” IEEE Trans. Information Forensics, and Security, vol. 13, no. 2, pp. 449–464, Feb. 2018
  3. R.-H. Hsu, J. Lee, T. Q. S. Quek, and J.-C. Chen, “Reconfigurable Security: Edge Computing-based Framework for IoT,” IEEE Network Mag., vol. 32, no. 5, pp. 92–99, Oct. 2018

2017

  1. M.Zhao, J. Ryu, J. Lee, T. Q. S. Quek, and S. Feng, “Exploiting Trust Degree for Multiple-Antenna User Cooperation,” IEEE Transactions on Wireless Communications
  2. P.Gope, J. Lee, and T. Q. S. Quek, “Resilience of DoS Attacks in Designing Anonymous User Authentication Protocol for Wireless Sensor Networks,” IEEE Sensors Journal
  3. P.Gope, R.-H. Hsu, J. Lee, and T. Q. S. Quek, “Secure communication for D2D-aided fog computing: architecture, challenges, and solution,” IEEE Network
  4. P.Mohapatra, J. Lee, and T. Q. S. Quek, “Interference assisted secret key generation in discrete memoryless wiretap channel with public feedback,” IEEE Transactions on Information Forensics and Security
  5. J.Lee, J. Ryu, C. D. T. Thai, J. Wang, F. Wang, and T. Q. S. Quek, “Friends or foes – the design of confidential cooperative communication with untrustworthy relay,” IEEE Commun. Mag.
  6. R.-H. Hsu, J. Lee, T. Q. S. Quek, and J.-C. Chen, “ReSIoT: Reconfigurable security for IoT,” IEEE Wireless Communications

2016

  1. C.Cheng, J. Lee, T. Jiang, and T. Takagi, “Security analysis and improvements on two homomorphic authentication schemes for network coding,” IEEE Transactions on Information Forensics and Security, vol. 11, no. 5, pp. 993-1002, May 2016
  2. C.D. T. Thai, J. Lee, and T. Q. S. Quek, “Physical-layer secret key generation with colluding untrusted relays,” IEEE Transactions on Wireless Communications, vol. 15, no. 2, pp. 1517-1530, Feb. 2016
  3. J.Ryu, J. Lee, and T. Q. S. Quek, “Transmission strategy against opportunistic attack for MISO secure channels,” IEEE Communications Letters, vol. 20, no. 11, pp. 2304-2307, Nov. 2016
  4. J.Wang, J. Lee, and T. Q. S. Quek, “Best antenna placement for eavesdroppers: Distributed or co-located?,” IEEE Communications Letters, vol. 20, no. 9, pp. 1820-1823, Sep. 2016
  5. L.Q. Duy, T. Q. S. Quek, and J. Lee, “A game theoretic model for enabling honeypots in IoT networks,” in Proc. IEEE Int. Conf. Commun. (ICC), Kuala Lumper, Malaysia, May 2016
  6. L.Q. Duy, T. Q. S. Quek, J. Lee, S. Jin, and H. Zhu, “Deceptive attack and defense game in honeypot-enabled networks for the Internet of Things,” IEEE Internet of Things Journal, vol. 3, no. 6, pp. 1025-1035
  7. P.Mohapatra, C. R. Murthy, and J. Lee, “On the secrecy capacity region of the 2-user Z interference channel with unidirectional transmitter cooperation,” IEEE Transactions on Information Forensics and Security
  8. P.Mohapatra, N. Pappas, J. Lee, T. Q. S. Quek, and V. Angelakis, “Stability region of 2-user full-duplex broadcast channel with secrecy constraint,” in Proc. IEEE Int. Conf. Commun. (ICC), Kuala Lumper, Malaysia, May 2016
  9. J.Ryu, J. Lee, and T. Q. S. Quek, “Confidential cooperative communication with trust degree of potential eavesdroppers,” IEEE Transactions on Wireless Communications, vol. 15, no. 6, pp. 3823 – 3836, Jun. 2016

2015

  1. C.D. T. Thai, J. Lee, and T. Q. S. Quek, “Secret group key generation in physical layer for mesh topology” in Proc. IEEE Global Commun. Conf., San Diego, CA, Dec. 2015, pp. 1-6
  2. F.Wang, X. Yuan, J. Lee, and T. Q. S. Quek, “Wireless MIMO switching with trusted and untrusted relays: degrees of freedom perspective,” in Proc. IEEE Int. Conf. Commun., London, UK, Jun. 2015, pp. 1-6
  3. J.Ryu, J. Lee, and T. Q.S. Quek, “Trust-degree based beamforming for MISO cooperative communication system,” IEEE Communications Letters, vol. 19, no. 11, pp. 1957-1960, Nov. 2015
  4. J.Wang, J. Lee, F. Wang, and T. Q. S. Quek, “Jamming-aided secure communication in massive MIMO Rician channels,” IEEE Trans. Wireless Commun., vol. 14, no. 12, pp. 6854-6868, Dec. 2015
  5. Jong Yeol Ryu, Jemin Lee, and Tony Q. S. Quek, “Trust degree based beamforming for MISO cooperative communication system,” IEEE Communications Letters, vol. 19, no. 11, Nov. 2015
  6. R.Hsu, J. Lee, and T. Q. S. Quek, “Reliable and Privacy Preserving Secure D2D Communication in LTE-A,? in Proc. ACM Int. Conf. on Security and Privacy in Wireless and Mobile Networks, New York, NY, Jun. 2015
  7. S.-Y. Chang, J. Lee, and Y.-C. Hu, “Noah: Keyed noise flooding for wireless confidentiality,” in Proc. ACM Symposium on QoS and Security for Wireless and Mobile Networks (Q2SWinet), Cancun, Mexico, Nov. 2015, pp. 141- 148

2014

  1. C.D. T. Thai, J. Lee, C. Cheng, and T. Q. S. Quek, “Physical-layer secret key generation with untrusted relays” in Proc. IEEE Global Commun. Conf., Workshop on Trusted Communications with Physical Layer Security, Austin, TX, Dec. 2014, pp. 1–6
  2. J. Lee and T. Q. S. Quek, “Device-to-device communication in wireless mobile social networks,” in Proc. IEEE Semiannual Veh. Technol. Conf., Seoul, Korea, May 2014
  3. J. Wang, J. Lee, F. Wang, and T. Q. S. Quek, “Secure communication via jamming in massive MIMO Rician channels” in Proc. IEEE Global Commun. Conf., Workshop on Massive MIMO: From theory to practice, Austin, TX, Dec. 2014, pp. 1–6

 

Research & Security Innovation Lab for IoT
Duration: 14 Sep 2015 to 13 Mar 2019
PI and Co-PIs: Prof Yuval Elovici (PI), Asst Prof Martin Ochoa, Asst Prof Nils Ole Tippenhauer
Funding agency: Ministry of Defence

2019

  1. Tambe, A., Aung, Y., Sridharan, R., Ochoa, M., Tippenhauer, N., Shabati, A., Elovici, Y. “Detection of Threats to IoT Devices using Scalable VPN-forwarded Honeypots”, The 9th ACM Conference on Data and Application Security and Privacy, CODASPY 2019.
  2. Breitenbacher, D., Homoliak, I., Aung, Y., Tippenhauer, N., Elovici, Y., “HADES-IoT: A Practical Host-Based Anomaly Detection System for IoT Devices”, The 14th ACM ASIA Conference on Computer and Communications Security (ACM ASIACCS 2019) (accepted).
  3. Sachidananda, V., Bhairav, S., Ghosh N., Elovici, Y., “PIT: A Probe into Internet of Things by Comprehensive Security Analysis” The 18th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2019 (accepted)

2018

  1. Meidan, Y., Bohadana, M., Mathov, Y., Mirsky, Y., Breitenbacher, D., Shabati, A., Elovici, Y. “N-BaIoT: Network-based Detection of IoT Botnet Attacks Using Deep Autoencoders”, IEEE Pervasive Computing, Special Issue – Securing the IoT (July/Sep 2018).
  2. Neeraj, K., Sachidananda, V., Setikere, S., Zhou, J. Elovici, Y., “SMuF: State Machine Based Mutational Fuzzing for Internet of Things”, the 13th edition of the International Conference on Critical Information Infrastructures Security, September 2018, (CRITIS 2018).
  3. Setikere, S., Sachidananda, V., Elovici, Y., “Out of Kilter: Holistic Exploitation of Denial of Service in Internet of Things”, 14th EAI International Conference on Security and Privacy in Communication Networks, Aug 2018.
  4. Siboni, S., Sachidananda, V., Meidan, Y., Bohadana, M., Shabatia, A., Elovici Y., “Security Testbed for Internet of Things Devices”, IEEE Transactions on Reliability, 2018.
  5. Sridharan, R., Maiti, R., Tippenhauer, N., “WADAC: Privacy-Preserving Anomaly Detectionand Attack Classificationon Wireless Traffic” 11th ACM Conference on Security and Privacy in Wireless and Mobile Networks 2018, Stockholm, Sweden, June 2018.  

2017

  1. Antonioli, D., Siby, S., Tippenhauer, N., “Practical Evaluation of Passive COTS Eavesdropping in 802.11b/n/ac WLAN”, International Conference on Cryptology and Network Security (CANS 2017)
  2. Guarnizo, J., Tambe, A., Bhunia, S., Ochoa, M., Tippenhauer, N., Shabtai, A., Elovici, Y., “SIPHON : Towards Scalable High-Interaction Physical Honeypots”,  3rd ACM Cyber-Physical System Security Workshop (CPSS 2017), pp. 57- 68
  3. Maiti, R., Siby, S.,  Sridharan, R., Tippenhauer, N., “Link-Layer Device Type Classification on Encrypted Wireless Traffic with COTS Radios”,  22nd European Symposium on Research in Computer Security (ESORICS), pp.247-264
  4. Meidan, Y., Bohadana, M., Shabati, A., Elovici, Y., Ochoa, M., Tippenhauer, N., Guarnizo, J.,D., “Poster: ProfilIoT: A Machines learning Approach for IoT Device Identification Based on Network Traffic Analysis”,  The 32nd ACM Symposium on Applied Computing (SAC 2017)
  5. Meidan, Y., Bohadana, M., Shabtai, A., Ochoa, M., Tippenhauer, N. O., Davis Guarnizo, J., Elovici, Y., “Detection of Unauthorized IoT Devices Using Machine Learning Techniques”, 2017, arXiv preprint arXiv:1709.04647
  6. Sachidananda, V., Toh, J., Siboni, S., Shabati, A., Elovici, Y., “Let the Cat Out of the Bag: A Holistic Approach Towards Security Analysis of the Internet of Things”  3rd International Workshop on IoT Privacy, Trust, and Security (IoTPTS), pp. 3-10
  7. Siby, S., Maiti, R., Tippenhauer, N.,  “IoTScanner: Detecting Privacy Threats in IoT Neighborhoods”, 3rd International Workshop on IoT Privacy, Trust, and Security (IoTPTS), pp. 23- 30
  8. Siby, S., Maiti, R., Tippenhauer, N., “IoTScanner: Detecting and Classifying Privacy Threats in IoT Neighborhoods”, submitted in arXiv, http://arxiv.org/abs/1701.05007. 

2016

  1. Sachidananda, V., Toh, J., Siboni, S., Shabatia, A., Elovici Y., “Poster: Towards Exposing Internet of Things: A Roadmap”, ACM Conference on Computer and Communications Security (CCS) 2016: 1820-1822
  2. Siboni, S., Shabatia, A., Tippenhauer, N., Lee, J., Elovici, Y., “Advanced Security Testbed Framework for Wearable IoT Devices”, ACM Transactions on Internet Technology (TOIT), 16(4): 26:1-26:25 (2016)

 
Security by Design for Interconnected Critical Infrastructures
Duration: 1 Apr 2016 to 30 Apr 2019
PI and Co-PI: Prof Aditya Mathur (PI), Assoc Prof Arlindo Silva
Funding agency: National Research Foundation

2019

  1. Cheng F., Palleti V. R, Mathur A., Chana D., “A Systematic Framework to Generate Invariant Rules for Anomaly Detection in Industrial Control Systems,” The Network and Distributed System Security Symposium (NDSS) 2019

2018

  1. de Winter C., Palleti V. R., Worm D., Kooij R., “Optimal Placement of Imperfect Water Quality Sensors in Water Distribution Networks,” Computers & Chemical Engineering
  2. V. R. Palleti, Victor J., Silva A., “A Contribution of Axiomatic Design Principles to the Analysis and Impact of Attacks on Critical Infrastructures,” International Journal of Critical Infrastructure Protection

2017

  1. Ahmed C. M., Reddy V., Mathur A., “WADI: A Water Distribution Testbed for Research in the Design of Secure Cyber Physical Systems”, 3rd International Workshop on Cyber-Physical Systems for Smart Water Networks (CySWater) 2017

 

Testing for Blockchain Security by Design
Duration: 1 Oct 2017 to 30 Sept 2019
PI and Co-PIs: Prof Aditya Mathur/ Asst Prof Pawel Szalachowski (PI), Asst Prof Georgios Piliouras and Assoc Prof Jun Sun
Funding agency: National Research Foundation

2019

  1. Vitalik Buterin, Daniel Reijsbergeny, Stefanos Leonardos, Georgios Piliouras, “Incentives in Ethereum’s Hybrid Casper Protocol”, IEEE International Conference on Blockchain and Cryptocurrency (ICBC 2019)
  2. Stefanos Leonardos, Daniel Reijsbergen, Georgios Piliouras, “Weighted Voting on the Blockchain: Improving Consensus in Proof of Stake Protocols”, IEEE International Conference on Blockchain and Cryptocurrency (ICBC 2019)
  3. Nikos Leonardos, Stefanos Leonardos, and Georgios Piliouras. Oceanic games: Centralization risks and incentives in blockchain mining, 1st International Conference on Mathematical Research for Blockchain Economy (MARBLE), 2019

2018

  1. Vincent Chia, Pieter Hartely, Qingze Humy, Sebastian Ma, Georgios Piliourasy, Daniel Reijsbergeny, Mark van Staalduinen, Pawel Szalachowskiy, “Rethinking Blockchain Security: Position Paper”, 2018 IEEE International Conference on Blockchain
  2. Pawel Szalachowski, “Towards More Reliable Bitcoin Timestamps”, 2018 Crypto Valley Conference on Blockchain Technology

 


NSoE DeST-SCI Projects Publications

Project Title: Automation of anomaly generators; Digital twinning of water and power testbeds
PI: Prof Aditya Mathur, SUTD
Co-PI: Prof Zhou Jianying, SUTD

  1. Herman Wijaya, Mauricio Aniche, Aditya Mathur, “Domain-Based Fuzzing for Supervised Learning of Anomaly Detection in Cyber Physical Systems”, The 1st International Workshop on Engineering and Cybersecurity of Critical Systems (EnCyCriS) 2020. (accepted)
  2. Salimah Liyakkathali, Francisco Furtado, Gayathri Sugarmar, Aditya Mathur, “Validating Anomaly Detection Mechanisms in Industrial Control Systems”, Thirteenth International Tools and Methods of Competitive Engineering Symposium (TMCE) 2020. (accepted)
  3. Gauthama Raman MR, Nivethitha Somu, Aditya P Mathur, “A Multilayer Perceptron Model for Anomaly Detection in Water Treatment Plants”, International Journal of Critical Infrastructure Protection (2020), doi: https://doi.org/10.1016/j.ijcip.2020.100393.
  4. Gayathri Sugumar, B. S. Salimah Liyakkathali, Aditya Mathur, “Attacklets to Test Anomaly Detectors for Critical Infrastructure”,  3rd International Workshop on Artificial Intelligence and Industrial Internet-of-Things Security (AIoTS), June 2021 
  5. Madhumitha Balaji, Siddhant Shrivastava, Sridhar Adepu and Aditya Mathur, “Super Detector: An Ensemble Approach for Anomaly Detection in Industrial Control Systems”, The 16th International Conference on Critical Information Infrastructures Security (CRITIS2021), Sep 2021 (accepted)
  6. Gauthama Raman M R, Chuadhry Mujeeb Ahmed, and Aditya P. Mathur, “Machine learning for intrusion detection in industrial control systems: challenges and lessons from experimental evaluation”, Cybersecurity 4, 27 (2021). https://doi.org/10.1186/s42400-021-00095-5
  7. Gauthama Raman M R, Wenjie Dong, and Aditya P. Mathur. “Deep autoencoders as anomaly detectors: Method and case study in a distributed water treatment plant.” Computers & Security 99 (2020): 102055.
  8. Ahmed, Chuadhry Mujeeb, Gauthama Raman M R, and Aditya P. Mathur. “Challenges in machine learning based approaches for real-time anomaly detection in industrial control systems.” Proceedings of the 6th ACM on Cyber-Physical System Security Workshop. 2020.
  9. Lien, Sung Dillon Cheong, Gauthama Raman M R, and Aditya P. Mathur. “Design-Knowledge in Learning Plant Dynamics for Detecting Process Anomalies in Water Treatment Plants.” Computers & Security (2021): 102532.
  10. Gauthama Raman M R, and Aditya P. Mathur. “AICrit: A unified framework for real-time anomaly detection in water treatment plants.” Journal of Information Security and Applications 64 (2022): 103046.
  11. Gauthama Raman M R and Aditya Mathur, “A Hybrid Physics-Based Data-Driven Framework for Anomaly Detection in Industrial Control Systems,” in IEEE Transactions on Systems, Man, and Cybernetics: Systems, doi: 10.1109/TSMC.2021.3131662.
  12. Siddhant Shrivastava, Gauthama Raman M R and Aditya Mathur, “PCAT: PLC Command Analysis Tool for automatic incidence response in Water Treatment Plants,” 2021 IEEE International Conference on Big Data (Big Data), 2021, pp. 2151-2159, doi: 10.1109/BigData52589.2021.9671615.

 

Project Title: Scalable Hybrid Honeypot Infrastructure for IoT Threat Intelligence and Response
PI: Prof Zhou Jianying, SUTD

  1. Yan Lin Aung, Hui Hui Tiang, Herman Wijaya, Martin Ochoa, and Jianying Zhou, “Scalable VPN-forwarded Honeypots: Dataset and Threat Intelligence Insights”, Sixth annual Industrial Control System Security Workshop  (ICSS 2020), Dec 2020.
  2. “Scanning the Cycle: Timing-based Authentication on PLCs”, Chuadhry Mujeeb Ahmed, Martin Ochoa, Jianying Zhou, and Aditya Mathur, 2021 ACM Asia Conference on Computer and Communications Security (AsiaCCS’21), pages 886–900, Hong Kong, China, June 2021.
  3. Chuadhry Mujeeb Ahmed, Jianying Zhou, “Bank Of Models: Sensor Attack Detection and Isolation in Industrial Control Systems”, The 16th International Conference on Critical Information Infrastructures Security (CRITIS2021), Sep 2021.

 

Project Title: LEarning from Network and Process data to secure Water Distribution Systems 
PI: Asst Prof Stefano Galelli, SUTD
Co-PI: Dr Riccardo Taormina, TU Delft 

  1. Andres Murillo, Riccardo Taormina, Nils Tippenhauer, Stefano Galelli, “Co-Simulating Physical Processes and Network Data for High-Fidelity Cyber-Security Experiments”, ICSS 2020: Sixth Annual Industrial Control System Security (ICSS) Workshop, December 2020, Pages 13–20 https://doi.org/10.1145/3442144.3442147
  2. Stefano Galelli, “A digital twin for cyber-security research of water distribution systems”, Virtual 2021 World Environmental & Water Resources Congress, June 2021.

 

Project Title: A two-track approach to CPS Reconnaissance: causal-graphs and axiomatic design
PI: Assoc Prof Arlindo Silva, SUTD
Co-PIs: Dr Christopher Poskitt, SMU; Dr Venkata Palleti, IIPE 

  1. Cheah Huei Yoong, Venkata Reddy Palleti, Arlindo Silva, and Christopher M. Poskitt, “Towards Systematically Deriving Defence Mechanisms from Functional Requirements of Cyber-Physical Systems”, Proceedings of the 6th ACM Cyber-Physical System Security Workshop (CPSS 2020), October 2020, Pages 11-22, https://doi.org/10.1145/3384941.3409589
  2. Cheah Huei Yoong, Venkata Reddy Palleti, Rajib Ranjan Maiti, Arlindo Silva, and Christopher M. Poskitt, “Deriving invariant checkers for critical infrastructure using axiomatic design principles”, Cybersecurity (2021).
  3. Rajib Ranjan Maiti , Cheah Huei Yoong, Venkata Reddy Palleti, Arlindo Silva, and Christopher M. Poskitt, “Mitigating Adversarial Attacks on Data-Driven Invariant Checkers for Cyber-Physical Systems”, IEEE Transactions on Dependable and Secure Computing (2022).

 

Project Title: Automated Framework for Generating Cyber-physical Range for Smart Grid
PI: Dr Daisuke Mashima, ADSC 
Co-PIs: Prof Ee-Chien Chang, NUS; Prof David Nicol, ADSC; Dr Partha Biswas, ADSC

  1. Daisuke Mashima, Derek Kok, and Wei Lin, Muhammad Hazwan and Alvin Cheng, “On Design and Enhancement of Smart Grid Honeypot System for Practical Collection of Threat Intelligence”, 13th USENIX Workshop on Cyber Security Experimentation and Test
  2. Muhammad M. Roomi; Partha P. Biswas; Daisuke Mashima; Yuting Fan; Ee-Chien Chang, “False Data Injection Cyber Range of Modernized Substation System”,   2020 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm)
  3. Muhammad M. Roomi, Daisuke Mashima, Nandhakumar Kandasamy, Partha P. Biswas, “Cyber-attack Case Studies on Dynamic Voltage Restorer in Smart Grid, Applied Cryptography and Network Security Workshops
  4. Muhammad M. Roomi, Wen Shei Ong, Daisuke Mashima, and S. M. Suhail Hussain, “OpenPLC61850: An IEC 61850 MMS Compatible Open Source PLC for Smart Grid Research.” In Press for Elsevier SoftwareX.

 

Project Title: Enhancing Dynamic Analysis of Firmware in IoT Infrastructures via Component Functionality Inference
PI: Assoc Prof Liang Zhenkai, NUS

  1. Kulani Mahadewa, Yanjun Zhang, Guangdong Bai, Lei Bu, Zhiqiang Zuo, Dileepa Fernando, Zhenkai Liang, Jin Song Dong, “Identifying Privacy Weaknesses from Multi-party Trigger-Action Integration Platforms”, ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA) 2021
  2. Jian Mao; Ziwen Liu; Qixiao Lin; Zhenkai Liang, “Semantic-Fuzzing-Based Empirical Analysis of Voice Assistant Systems of Asian Symbol Languages”, IEEE Internet of Things Journal, https://doi.org/10.1109/JIOT.2021.3113645

 

Project Title: Design and reinforcement security on smart grids against cyber-physical attack
PI: Assoc Prof Yuen Chau, SUTD 
Co-PIs: Assoc. Prof. Tay Wee Peng, NTU; Prof. Dusit Niyato, NTU; Asst. Prof. Christopher Lee, NTU; Dr. Koh Leong Hai, NTU

  1. Mohammadreza Chamanbaz and Roland Bouanais, “A Sequential Algorithm for Sampled Mixed-integer Optimization Problems”, 21st IFAC World Congress 2020. 
  2. Niladri Sekhar Tripathy, Indra Narayan Kar, Mohammadreza Chamanbaz and Roland Bouanais,”Robust Stabilization of a Class of Nonlinear Systems via Aperiodic Sensing and Actuation”, IEEE Access, vol 8, pp. 157403-157417

 

Project Title: FBI – Featherlight Blockchain for IoT
PI: Asst Prof Dinh Tien Tuan Anh, SUTD 

  1. Daniël Reijsbergen and Tien Tuan Anh Dinh, “On Exploiting Transaction Concurrency To Speed Up Blockchains”, 40th IEEE International Conference on Distributed Computing Systems 2020. 
  2. Daniël Reijsbergen, Zheng Yang, Aung Maw, Tien Tuan Anh Dinh, and Jianying Zhou, “Transparent Electricity Pricing with Privacy”, 26th European Symposium on Research in Computer Security (ESORICS) 2021, Oct 2021.
  3. Daniël Reijsbergen, Aung Maw, Tien Tuan Anh Dinh, Wentai Li, and Chau Yuen “Securing Smart Grids Through an Incentive Mechanism for Blockchain-Based Data Sharing” 12th ACM Conference on Data and Application Security and Privacy 2022
  4. Daniel Reijsbergen, Aung Maw, Sarad Venugopalan, Tien Tuan Anh Dinh, “Protecting the Integrity of AMI Data and Firmware With A Feather-Light Blockchain Infrastructure” IEEE International Conference on Blockchain and Cryptocurrency 2022

 

Project Title: Towards Practical Attestation Solutions for Countering Advanced Attacks to Industrial Control Systems
PI: Assoc. Prof. Binbin Chen, SUTD 
Co-PIs: Assoc. Prof. Sun Jun, SMU; Prof. Zbigniew Kalbarczyk, ADSC

  1. Yuqi Chen, Bohan Xuan, Christopher M. Poskitt, Jun Sun, Fan Zhang, “Active Fuzzing for Testing and Securing Cyber-Physical Systems“, ISSTA’20 (29th ACM SIGSOFT International Symposium on Software Testing and Analysis)
  2. Yuqi Chen, Christopher M. Poskitt, Jun Sun, “Code Integrity Attestation for PLCs Using Black Box Neural Network Predictions”, ESEC/FSE’21 (29th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software)
  3. Heng Chuan Tan, Vyshnavi Mohanraj, Binbin Chen, Daisuke Mashima, Shing Kham Shing Nan, Aobo Yang, “An IEC 61850 MMS Traffic Parser for Customizable and Efficient Intrusion Detection”, IEEE SmartGridComm 2021
    • https://github.com/smartgridadsc/MMS-protocol-parser-for-Zeek-IDS
    • https://github.com/smartgridadsc/mms-custom-event-generator
  4. Suman Sourav, Partha P. Biswas, Binbin Chen, Daisuke Mashima, “Detecting Hidden Attackers in Photovoltaic systems Using Machine Learning”, IEEE SmartGridComm 2022
  5. Christopher M. Poskitt, Yuqi Chen, Jun Sun, Yu Jiang, “Finding Causally Different Tests for an Industrial Control System”, ICSE’23 (45th IEEE/ACM International Conference on Software Engineering)
  6. Wei Lin, Heng Chuan Tan, Binbin Chen “DNAttest: Digital-twin-based Non-intrusive Attestation under Transient Uncertainty”, DSN 2023
  1.  

Project Title: Automated Incident Response and Recovery in ICS
PI: Prof Zhou Jianying, SUTD 

  1. John H. Castellanos, Martin Ochoa, Alvaro Cardenas, Owen Arden, Jianying Zhou, “AttkFinder: Discovering Attack Vectors in PLC Programs using Information Flow Analysis”, The 24th International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2021), Oct 2021

NSoE DeST-SCI 2 Projects Publications

Sector: Electric Power
Sector Lead: Assoc Prof Chen Binbin, SUTD and Assoc Prof Daisuke Mashima, SUTD 

 

Sector: Internet of Things
Sector Lead: Assoc Prof Sudipta Chattopadhyay, SUTD

 

Sector: Maritime
Sector Lead: Prof Zhou Jianying, SUTD

 

Sector: Water
Sector Lead: Prof Aditya Mathur, SUTD

  1. Gauthama Raman and Aditya Mathur, “AICrit: A Design-Enhanced Anomaly Detector and Its Performance Assessment in a Water Treatment Plant” Appl. Sci. 202313(24), 13124
  2. Gauthama Raman and Aditya Mathur, “Fusing Design and Machine Learning for Anomaly Detection in Water Treatment Plants” Electronics 202413(12), 2267

  3. Abisheg S, Gauthama Raman M R, Aditya P Mathur, “Adaptive Data-Driven LSTM Model for Sensor Drift Detection in Water Utilities” International Conference on Applications and Techniques in Information Security 2024