|
Security and Privacy-Aware Cyber-Physical Systems |
Publications
- F. Miao, Q. Zhu, M. Pajic, and G. J. Pappas, "A Moving-Horizon Hybrid Stochastic Game for Secure Control of Cyber-Physical Systems", Automatica, submitted.
- Junkil Park, Radoslav Ivanov, James Weimer, Miroslav Pajic, Insup Lee, Sang Hyuk Son, "Security of Cyber-Physical Systems in the Presence of Transient Sensor Faults", ACM Transactions on Cyber-Physical Systems, submitted second revision.
- Ilija Jovanov and Miroslav Pajic, "Relaxing Integrity Requirements for Attack-Resilient Cyber-Physical Systems", ACM/IEEE International Conference on Cyber-Physical Systems (ICCPS), 2017 submitted.
- Miroslav Pajic, James Weimer, Nicola Bezzo, Oleg Sokolsky, George J. Pappas, and Insup Lee, "Design and Implementation of Attack-Resilient Cyber-Physical Systems", IEEE Control Systems Magazine, Vol. 37, Issue 2, April 2017
- F. Miao, Q. Zhu, M. Pajic, and G.J. Pappas, "Coding Schemes for Securing Cyber-Physical Systems Against Stealthy Data Injection Attacks", IEEE Transactions on Control of Network Systems, Vol. 4, Issue 1, March 2017
- Fragkiskos Koufogiannis, George J. Pappas, "Diffusing Private Data over Networks", IEEE Transactions on Control of Network Systems, Vol. PP, Issue 99, published online February 2017
- Vasileios Tzoumas, Ali Jadbabaie, George J. Pappas, "Optimal Sensor Scheduling for Finite-Horizon Kalman Filtering: Submodularity, Algorithms, and Design Limits", Proceedings of the 55th Conference on Decision and Control (CDC 2016), Las Vegas, NV, December 2016
- Fragkiskos Koufogiannis, George J. Pappas, "Location-dependent privacy", Proceedings of the 55th Conference on Decision and Control (CDC 2016), Las Vegas, NV, December 2016
- Fragkiskos Koufogiannis, George J. Pappas, "Multi-owner Multi-user Privacy", Proceedings of the 55th Conference on Decision and Control (CDC 2016), Las Vegas, NV, December 2016
- Y. Shoukry, K. Gatsis, A. Alanwar, G. J. Pappas, S. A. Seshia, M. Srivastava, and P. Tabuada, "Privacy-Aware Quadratic Optimization Using Partially Homomorphic Encryption", Proceedings of the 55th Conference on Decision and Control (CDC 2016), Las Vegas, NV, December 2016
- Marcella Hastings, Joshua Fried, Nadia Heninger, "Weak keys remain widespread in network devices", Proceedings of the 2016 Internet Measurement Conference (IMC 2016), Santa Monica, CA, USA, November 2016
- Stephen Checkoway, Shaanan Cohney, Christina Garman, Matthew Green, Nadia Heninger, Jacob Maskiewicz, Eric Rescorla, Hovav Shacham, and Ralf-Philipp Weinmann. “A Systematic Analysis of the Juniper Dual EC Incident”. Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security (CCS '16), Vienna, Austria, October 2016.
- P. Bogdan, M. Pajic, P. Pande, and V. Raghunathan, "Making the Internet-of-Things a Reality: From Smart Models, Sensing and Actuation to Energy-Efficient Architectures", Proceedings of the 11th International Conference on Hardware/Software Co-design and System Synthesis (CODES+ISSS), Article No. 25, Pittsburgh, PA, USA, October 2016
- M. Ibrahim, C. Boswell, K. Chakrabarty, M. Pajic, and K. Scott, "A Real-Time Digital-Microfluidic Platform for Epigenetics", Proceedings of the International Conference on Compilers, Architectures and Synthesis for Embedded Systems (Cases 2016), Article No. 10, Pittsburgh, PA, USA, October 2016
- Walker J and Koppel R. “For Healthcare Cybersecurity the Whole is Weaker than the Sum of the Parts” The Healthcare Blog (THCB), September 2016.
- Pajic, M., Lee, I. and Pappas G.J., "Attack-Resilient State Estimation for Noisy Dynamical Systems", IEEE Transactions on Control of Network Systems, accepted, published online September 2016.
- V. Lesi, Z. Jakovljevic and M. Pajic, "Towards Plug-n-Play Numerical Control for Reconfigurable Manufacturing Systems", 21st IEEE International Conference on Emerging Technologies and Factory Automation (ETFA 2016), Berlin, Germany, September 2016.
- Yuval Yarom, Daniel Genkin, and Nadia Heninger, "CacheBleed: A Timing Attack on OpenSSL Constant Time RSA", Cryptographic Hardware and Embedded Systems (CHES 2016), LNCS, vol. 9813, pp. 346-367, August 2016.
- Ang Chen, Yang Wu, Andreas Haeberlen, Wenchao Zhou, and Boon Thau Loo, "The Good, the Bad, and the Differences: Better Network Diagnostics with Differential Provenance", Proceedings of the 2016 ACM SIGCOMM Conference (SIGCOMM '16), Florianopolis, Brazil , August 2016.
- Nimrod Aviram, Sebastian Schinzel, Juraj Somorovsky, Nadia Heninger, Maik Dankel, Jens Steube, Luke Valenta, David Adrian, J. Alex Halderman, Viktor Dukhovni, Emilia Käsper, Shaanan Cohney, Susanne Engels, Christof Paar, and Yuval Shavitt, "DROWN: Breaking TLS using SSLv2", Proceedings of the 25th USENIX Security Symposium, Austin, TX, USA, August 2016.
- Soumerai S, Koppel R, Ceccarelli R, "The 50-Year Legacy of Campbell and Stanley. It Still Debunks the False Dichotomy of Research Design". Lind Library Journal. London, UK 2016
- Luke Valenta, Shaanan Cohney, Alex Liao, Joshua Fried, Satya Bodduluri, and Nadia Heninger, "Factoring as a Service". Financial Cryptography 2016
- Ross Koppel, "Great Promises of Healthcare Information Technology Deliver Less". Chapter in: C.A. Weaver et al. (eds.), Healthcare Information Management Systems: Cases, Strategies, and Solutions, Health Informatics Springer International Publishing Switzerland 2016
- Shuo Han, Ufuk Topcu, George J. Pappas, "Event-based Information-theoretic Privacy: A Case Study of Smart Meters". American Control Conference (ACC 2016), Boston, MA, USA, July 2016.
- H. Nguyen, B. Acharya, R. Ivanov, A. Haeberlen, L. T. X. Phan, O. Sokolsky, J. Walker, J. Weimer, C. W. Hanson, and I. Lee, "Cloud-Based Secure Logger for Medical Devices". IEEE First International Conference on Connected Health: Applications, Systems and Engineering Technologies (CHASE 2016), Washington, DC, USA, June 2016.
- Radoslav Ivanov, Nikolay Atanasov, James Weimer, Miroslav Pajic, Allan Simpao, Mohamed Rehman, George Pappas, and Insup Lee, "Estimation of Blood Oxygen Content Using Context-Aware Filtering". 7th International Conference on Cyber-Physical Systems (ICCPS 2016), Vienna, Austria, April 2016.
- Junkil Park, Miroslav Pajic, Insup Lee and Oleg Sokolsky, "Scalable Verification of Linear Controller Software". In Proceedings of 22nd International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS 2016), Eindhoven, The Netherlands, April 2016.
- R. Ivanov, M. Pajic, and I. Lee, “Attack-Resilient Sensor Fusion for Safety-Critical Cyber-Physical Systems". ACM Transactions on Embedded Computing Systems, Volume 15 Issue 1, February 2016
- M. Pajic, P. Tabuada, I. Lee, and G. J. Pappas, “Attack-Resilient State Estimation in the Presence of Noise". In Proceedings of the 54th IEEE Conference on Decision and Control (CDC), pp. 527-532, Osaka, Japan, December 2015
- Ross Koppel and Stephen Soumerai, “Designing Good Research To Support Good Policy: The Case Of Health IT". HealthAffairs Blog, December 2015
- Ross Koppel, Sean Smith, Jim Blythe and Vijay Kothari. "Workarounds to Computer Access in Healthcare Organizations: You Want My Password or a Dead Patient?". Chapter in: Karen L Cortney, Alex Kuo and Omid Shabestari. Driving Quality in Informatics: Fulfilling the Promise. Amsterdam: IOS press, 2015
- Ross Koppel, "The health information technology safety framework: building great structures on vast voids". BMJ Quality and Safety doi:10.1136/bmjqs-2015-004746, November 2015
- Yang Wu, Ang Chen, Andreas Haeberlen, Wenchao Zhou, and Boon Thau Loo, "Automated Network Repair with Meta Provenance". Proceedings of the 14th ACM Workshop on Hot Topics in Networks (HotNets'15), Philadelphia, November 2015
- Ang Chen, Yang Wu, Andreas Haeberlen, Wenchao Zhou, and Boon Thau Loo, "Differential Provenance: Better Network Diagnostics with Reference Events". Proceedings of the 14th ACM Workshop on Hot Topics in Networks (HotNets'15), Philadelphia, November 2015
- R. Ivanov, N. Atanasov, M. Pajic, G. J. Pappas, and I. Lee, “Robust Estimation Using Context-Aware Filtering". 53rd Annual Allerton Conference on Communication, Control, and Computing (Allerton), October 2015
- Stephen Soumerai and Ross Koppel, “Avoiding Expensive And Consequential Health Care Decisions Based On Weak Research Designs". HealthAffairs Blog, August 2015
- Loren Riskin, Ross Koppel, David Riskin, "Re-examining health IT policy: what will it take to derive value from our investment?". Journal of the American Medical Informatics Association, Volume 22, Issue 2, pp. 459-464, March 2015
- Ross Koppel and Christoph U. Lehmann, "Implications of an Emerging EHR Monoculture for Hospitals and Healthcare Systems: An analysis of Epic’s market power". Journal of the American Medical Informatics Association, Volume 22, Issue 2, pp. 465-471, March 2015
|