No abstract available.
Proceeding Downloads
Keynote: A Tale of Two Industroyers: It was the Season of Darkness
In this talk, we discuss the first two known pieces of malware that attempted to create power grid blackouts. While previous research had described the malware at a high level, in this talk, we take a deep dive into the payload targeting the operational ...
Keynote: Dissecting the software supply chain of modern industrial control systems
Recent years have been pivotal in the field of Industrial Control Systems (ICS) security, with a large number of high-profile attacks exposing the lack of a design-for-security initiative in ICS. The evolution of ICS abstracting the control logic to a ...
WaXAI: Explainable Anomaly Detection in Industrial Control Systems and Water Systems
An Industrial Control System (ICS) plays a vital role in controlling and managing industrial processes. ICS predominantly operates without human supervision. This (mostly) autonomous role makes them an attractive target for adversaries. In recent years, ...
Building Detection-Resistant Reconnaissance Attacks Based on Adversarial Explainability
The growing popularity of Internet-of-Things devices makes them a desired target for malicious actors. Most attacks start with a reconnaissance phase where the attacker gathers information about the services running on the device, the open ports, and any ...
SRI: A Simple Rule Induction Method for improving resiliency of DNN based IDS against adversarial and zero-day attacks
Adversarial machine learning (ML) has demonstrated vulnerabilities of neural network methods against well-crafted perturbations when added to perfectly acceptable samples. These vulnerabilities get exacerbated when neural network methods are deployed as ...
Pixel Complexity Sorting Embedding for Reversible Data Hiding Based on Elastic net Predictor
Reversible data hiding techniques have increasingly garnered attention from researchers in the field of information security due to their capacity to recover the original image non-destructively and their substantial embedding capacity. Over recent years,...
X2065: Lightweight Key Exchange for the Internet of Things
The Internet is rapidly transitioning from a network of personal computers, laptops and mobile phones to a network that will soon connect 32 billion smart devices (or "things"), many of which are extremely constrained in terms of computational resources ...
Air-Bus Hijacking: Silently Taking over Avionics Systems
This paper investigates cyber-physical attacks on avionics data buses, specifically focusing on the ARINC 429 protocol. The objective is to demonstrate how message injection, modification, and deletion attacks can be executed, enabling an attacker to ...
K-RAPID: A Formal Executable Semantics of the RAPID Robot Programming Language
Industrial robots are widely used in industrial production as mechanical devices. It is essential to guarantee that their control software operates safely and properly, as any functional or security-related defects may lead to serious incidents. However, ...
DRACE: A Framework for Evaluating Anomaly Detectors for Industrial Control Systems
The detection of process anomalies is a critical step in defending a physical plant against cyber-attacks. We propose a framework named DRACE that includes a set of metrics to evaluate the effectiveness of anomaly detectors, referred to as Intrusion ...
Mobile_FL: A streamlined FL framework for process optimisation via client clustering using rough c-means algorithm
Currently, Federated Learning is one of the most widely accepted distributed learning frameworks for privacy-sensitive applications. Despite the popularity gained, FL frameworks struggle to perform well in terms of accuracy and model convergence for ...
Capture The Industrial Flag: Lessons from hosting an ICS cybersecurity exercise
- Stanislav Abaimov,
- Joseph Gardiner,
- Emmanouil Samanis,
- Jacob Williams,
- Marios Samanis,
- Feras Shahbi,
- Awais Rashid
Industrial Control Systems (ICS) are integral to critical infrastructure, necessitating advanced cybersecurity training. Addressing the urgent need for specialized cybersecurity training, this paper details the UK's first Capture-The-Flag (CTF) event ...