Skip to main content
To KTH's start page To KTH's start page

Publications and presentations

View selected publications and presentations about CERCES through the links below.

Journal and conference articles

[1]
C. Baumann et al., "On Compositional Information Flow Aware Refinement," in 2021 IEEE 34Th Computer Security Foundations Symposium (CSF 2021), 2021, pp. 17-32.
[2]
H. Forssell, "Performance Guarantees for Physical Layer Authentication in Mission-Critical Communications," Doctoral thesis Stockholm, Sweden : -, TRITA-EECS-AVL, 2021:1, 2021.
[3]
N. Dong, R. Guanciale and M. Dam, "Refinement-Based Verification of Device-to-Device Information Flow," in Proceedings of the 21st Conference on Formal Methods in Computer-Aided Design – FMCAD 2021, 2021.
[4]
Z. Li, G. Dán and D. Liu, "A Game Theoretic Analysis of LQG Control under Adversarial Attack," in 2020 59th IEEE Conference on Decision and Control (CDC), 2020, pp. 1632-1639.
[5]
D. Lundberg et al., "Hoare-Style Logic for Unstructured Programs," in Software Engineering and Formal Methods, 2020, pp. 193-213.
[6]
R. Guanciale, M. Balliu and M. Dam, "InSpectre : Breaking and Fixing Microarchitectural Vulnerabilities by Formal Analysis," in CCS '20: Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications, 2020.
[7]
J. Milosevic, H. Sandberg and K. H. Johansson, "A Security Index for Actuators Based on Perfect Undetectability : Properties and Approximation," in 2018 56th Annual Allerton Conference on Communication, Control, and Computing, Allerton 2018, 2019, pp. 235-241.
[8]
M. Chong, H. Sandberg and A. M. H. Teixeira, "A Tutorial Introduction to Security and Privacy for Cyber-Physical Systems," in Proceedings 2019 18th European Control Conference (ECC), 2019, pp. 968-978.
[9]
S. Saritas et al., "Adversarial Attacks on Continuous Authentication Security: A Dynamic Game Approach," in 10th International Conference, GameSec 2019, Stockholm, Sweden, October 30 – November 1, 2019, Proceedings, 2019, pp. 439-458.
[10]
F. Farokhi and H. Sandberg, "Ensuring privacy with constrained additive noise by minimizing Fisher information," Automatica, vol. 99, pp. 275-288, 2019.
[11]
E. Shereen et al., "Next Steps in Security for Time Synchronization: Experiences from implementing IEEE 1588 v2.1," in Proceedings of 2019 IEEE International Symposium on Precision Clock Synchronization for Measurement, Control, and Communication, ISPCS, 2019.
[12]
D. Umsonst et al., "On the confidentiality of linear anomaly detector states," in Proceedings of the American Control Conference, 2019, pp. 397-403.
[13]
C. Baumann, O. Schwarz and M. Dam, "On the verification of system-level information flow properties for virtualized execution platforms," Journal of Cryptographic Engineering, vol. 9, no. 3, pp. 243-261, 2019.
[14]
K. H. Forssell, R. Thobaben and J. Gross, "Performance Analysis of Distributed SIMO Physical Layer Authentication," in ICC 2019 - 2019 IEEE International Conference on Communications (ICC), 2019.
[15]
H. Forssell et al., "Physical Layer Authentication in Mission-Critical MTC Networks : A Security and Delay Performance Analysis," IEEE Journal on Selected Areas in Communications, vol. 37, no. 4, pp. 795-808, 2019.
[16]
P. Zhao and G. Dán, "Scheduling Parallel Migration of Virtualized Services under Time Constraints in Mobile Edge Clouds," in Proceedings of the 31st International Teletraffic Congress, ITC 2019, 2019, pp. 28-36.
[17]
S. Fang et al., "Two-Way Coding in Control Systems Under Injection Attacks : From Attack Detection to Attack Correction," in ICCPS '19 : PROCEEDINGS OF THE 2019 10TH ACM/IEEE INTERNATIONAL CONFERENCE ON CYBER-PHYSICAL SYSTEMS, 2019, pp. 141-150.
[18]
P. Zhao and G. Dán, "A Benders Decomposition Approach for Resilient Placement of Virtual Process Control Functions in Mobile Edge Clouds," IEEE Transactions on Network and Service Management, vol. 15, no. 4, pp. 1460-1472, 2018.
[19]
D. Umsonst and H. Sandberg, "A game-theoretic approach for choosing a detector tuning under stealthy sensor data attacks," in 2018 IEEE CONFERENCE ON DECISION AND CONTROL (CDC), 2018, pp. 5975-5981.
[20]
M. I. Müller et al., "A Risk-Theoretical Approach to H2-Optimal Control under Covert Attacks," in 57th IEEE Conference on Decision and Control, 2018, pp. 4553-4558.
[21]
J. Giraldo et al., "A Survey of Physics-Based Attack Detection in Cyber-Physical Systems," ACM Computing Surveys, vol. 51, no. 4, 2018.
[22]
L. Lindemann and H. Sandberg, "Anomaly Detector Metrics for Sensor Data Attacks in Control Systems," in 2018 Annual American Control Conference (ACC), 2018, pp. 153-158.
[23]
E. Shereen and G. Dán, "Correlation-based Detection of PMU Time Synchronization Attacks," in 2018 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids, SmartGridComm 2018, 2018.
[24]
A. M. H. Teixeira et al., "Distributed Sensor and Actuator Reconfiguration for Fault-Tolerant Networked Control Systems," IEEE Transactions on Control of Network Systems, vol. 5, no. 4, pp. 1517-1528, 2018.
[25]
H. Nemati et al., "Formal verification of integrity-Preserving countermeasures against cache storage side-channels," in 7th International Conference on Principles of Security and Trust, POST 2018 Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2018, 2018, pp. 109-133.
[26]
J. Milosevic et al., "Quantifying the Impact of Cyber-Attack Strategies for Control Systems Equipped with an Anomaly Detector," in 2018 European Control Conference, ECC 2018, 2018, pp. 331-337.
[27]
P. Zhao and G. Dán, "Time Constrained Service-aware Migration of Virtualized Services for Mobile Edge Computing," in Proceedings of the 30th International Teletraffic Congress, ITC 2018, 2018, pp. 64-72.
[28]
S. Barreto et al., "Undetectable PMU Timing-Attack on Linear State-Estimation by UsingRank-1 Approximation," IEEE Transactions on Smart Grid, vol. 9, no. 4, pp. 3530-3542, 2018.
[29]
S. Barreto et al., "A Continuum of Undetectable Timing-Attacks on PMU-based Linear State-Estimation," in 2017 IEEE International Conference on Smart Grid Communications, SmartGridComm 2017, 2017, pp. 473-479.
[30]
K. Paridari et al., "A Framework for Attack-Resilient Industrial Control Systems : Attack Detection and Controller Reconfiguration," Proceedings of the IEEE, vol. 106, no. 1, pp. 113-128, 2017.
[31]
J. Milosevic et al., "Analysis and Mitigation of Bias Injection Attacks Against a Kalman Filter," IFAC-PapersOnLine, vol. 50, no. 1, pp. 8393-8398, 2017.
[32]
C. Baumann, O. Schwarz and M. Dam, "Compositional Verification of Security Properties for Embedded Execution Platforms," in PROOFS 2017 : 6th International Workshop on Security Proofs for Embedded Systems, 2017, pp. 1-16.
[33]
J. Milošević et al., "Exploiting Submodularity in Security Measure Allocation for Industrial Control Systems," in Proceedings of the 1st ACM Workshop on the Internet of Safe Things, 2017, pp. 64-69.
[34]
H. Forssell et al., "On the Impact of Feature-Based Physical Layer Authentication on Network Delay Performance," in Globecom 2017 - 2017 IEEE Global Communications Conference, 2017.
[35]
F. Farokhi and H. Sandberg, "Optimal Privacy-Preserving Policy Using Constrained Additive Noise to Minimize the Fisher Information," in 2017 IEEE 56TH ANNUAL CONFERENCE ON DECISION AND CONTROL (CDC), 2017.
[36]
H. Li, G. Dán and K. Nahrstedt, "Portunes plus : Privacy-Preserving Fast Authentication for Dynamic Electric Vehicle Charging," IEEE Transactions on Smart Grid, vol. 8, no. 5, pp. 2305-2313, 2017.
[37]
P. Zhao and G. Dán, "Resilient Placement of Virtual Process Control Functions in Mobile Edge Clouds," in 2017 IFIP Networking Conference (IFIP NETWORKING) and Workshops, 2017.
[38]
D. Umsonst, H. Sandberg and A. A. Cardenas, "Security analysis of control system anomaly detectors," in American Control Conference (ACC), 2017, 2017, pp. 5500-5506.
[39]
M. R. Asghar et al., "Smart Meter Data Privacy : A Survey," IEEE Communications Surveys and Tutorials, vol. 19, no. 4, pp. 2820-2835, 2017.
[40]
O. Schwarz and M. Dam, "Automatic Derivation of Platform Noninterference Properties," in Software Engineering and Formal Methods, Springer LNCS 9763, 2016, pp. 27-44.
[41]
R. Guanciale et al., "Cache Storage Channels : Alias-Driven Attacks and Verified Countermeasures," in Proceedings - 2016 IEEE Symposium on Security and Privacy, SP 2016, 2016, pp. 38-55.
[42]
H. Forssell et al., "Feature-Based Multi-User Authentication for Parallel Uplink Transmissions," in 2016 9TH INTERNATIONAL SYMPOSIUM ON TURBO CODES AND ITERATIVE INFORMATION PROCESSING (ISTC), 2016, pp. 355-359.
[43]
H. Sandberg and A. M. H. Teixeira, "From Control System Security Indices to Attack Identifiability," in 2016 Science of Security for Cyber-Physical Systems Workshop, SOSCYPS 2016, 2016.
[44]
D. I. Urbina et al., "Limiting the impact of stealthy attacks on Industrial Control Systems," in CCS '16 Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016, pp. 1092-1105.
[45]
F. Farokhi, J. Milosevic and H. Sandberg, "Optimal State Estimation with Measurements Corrupted by Laplace Noise," in 2016 IEEE 55th Conference on Decision and Control, CDC 2016, 2016, pp. 302-307.
[46]
R. Guanciale et al., "Provably secure memory isolation for Linux on ARM," Journal of Computer Security, vol. 24, no. 6, pp. 793-837, 2016.
[47]
D. I. Urbina et al., "Survey and New Directions for Physics-Based Attack Detection in Control Systems," National Institute of Standards and Technology, NIST Pubs, 16-010, 2016.
[48]
Full list in the KTH publications portal

Presentations

Resilient Smart Grid Control: Two Case Studies (pdf 2.1 MB) , 1st ACM Workshop on the Internet of Safe Things, Delft, The Netherlands, 2017.

Control Systems Security Metrics and Risk Management (pdf 3.6 MB) , DISC Summer School, The Hague, The Netherlands, 2017.

Security of Cyber-Physical Systems (pdf 4.3 MB) , 7th oCPS PhD School on Cyber-Physical Systems, Lucca, Italy, 2017.

Physics-Based Attack Detection and Countermeasures in Control Systems (pdf 1.9 MB) , 4SICS, Stockholm, Sweden, 2016.

CERCES - Center for Resilient Critical Infrastructure , MSB:s Forskardagar, Stockholm, Sweden, 2015

Security and Limitations of Cyber-Physical Systems , PhD course, Linköping University, Sweden, 2015. 

CERCES: Center for Resilient Critical Infrastructures (pdf 186 kB) . National Symposium on Technology and Methodology for Security and Crisis Management (TAMSEC), Stockholm, Sweden, 2015.