March 24, 2022, 1:20 a.m. | Suman Sourav, Binbin Chen

cs.CR updates on arXiv.org arxiv.org

In this paper, we propose an effective and easily deployable approach to
detect the presence of stealthy sensor attacks in industrial control systems,
where (legacy) control devices critically rely on accurate (and usually
non-encrypted) sensor readings. Specifically, we focus on stealthy attacks that
crash a sensor and then immediately impersonate that sensor by sending out fake
readings. We consider attackers who aim to stay hidden in the system for a
prolonged period. To detect such attacks, our approach relies on …

attacks micro

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Security Compliance Architect - Experian Health (Can be REMOTE from anywhere in the US)

@ Experian | ., ., United States

IT Security Specialist

@ Ørsted | Kuala Lumpur, MY

Senior, Cyber Security Analyst

@ Peloton | New York City

Cyber Security Engineer | Perimeter | Firewall

@ Garmin Cluj | Cluj-Napoca, Cluj County, Romania

Pentester / Ethical Hacker Web/API - Vast/Freelance

@ Resillion | Brussels, Belgium