Items where Division is "Nils Ole Tippenhauer (SCy-Phy)" and Year is 2023

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Author(s)/Creator(s) | Item Type | No Grouping
Number of items: 5.

Bytes, Andrei and Rajput, Prashant Hari Narayan and Doumanidis, Constantine and Tippenhauer, Nils Ole and Maniatakos, Michail and Zhou, Jianying
(2023) FieldFuzz: In Situ Blackbox Fuzzing of Proprietary Industrial Automation Runtimes via the Network.
In: Proceedings of International Symposium on Research in Attacks, Intrusions and Defenses (RAID).
Conference: RAID The International Symposium on Research in Attacks, Intrusions and Defenses (was International Symposium on Recent Advances in Intrusion Detection)

Ding, Aolin and Chan, Matthew and Hassanzadeh, Amin and Tippenhauer, Nils Ole and Ma, Shiqing and Zonouz, Saman
(2023) Get Your Cyber-Physical Tests Done! Data-Driven Vulnerability Assessment of Robotic Vehicle.
In: Proceedings of the International Conference on Dependable Systems and Networks (DSN).
Conference: DSN IEEE/IFIP International Conference on Dependable Systems and Networks

Erba, Alessandro and Tippenhauer, Nils Ole
(2023) White-box Concealment Attacks Against Anomaly Detectors for Cyber-Physical Systems.
In: Proceedings of Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA).
Conference: DIMVA GI International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment

Schlüter, Till and Choudhari, Amit and Hetterich, Lorenz and Trampert, Leon and Nemati, Hamed and Ibrahim, Ahmad and Schwarz, Michael and Rossow, Christian and Tippenhauer, Nils Ole
(2023) FetchBench: Systematic Identification and Characterization of Proprietary Prefetchers.
In: CCS 2023, 26-30 Nov 2023, Copenhagen, Denmark.
Conference: CCS ACM Conference on Computer and Communications Security

Walita, Tim and Erba, Alessandro and Castellanos, John H. and Tippenhauer, Nils Ole
(2023) Blind Concealment from Reconstruction-based Attack Detectors for Industrial Control Systems via Backdoor Attacks.
In: Proceedings of the Cyber-Physical System Security Workshop (CPSS).
Conference: UNSPECIFIED

This list was generated on Wed Jul 3 05:28:11 2024 CEST.