NSF Project on Higher Education on CPS Security (Year
2 Outcomes) |
During Sep 2014-Aug 2015, the following outcomes have been achieved: |
Publications |
[1] Fei Hu, Thomas H.
Morris, Debra M. McCallum, Hongbo Zhou, "Towards
a Multimedia-based Virtual Classroom on Cyber-Physical System (CPS)
Security Education for Both City and Rural Schools," ASEE 2015,
Seattle, WA, USA, June 14-17, 2015.
|
[2] Thornton, Z., Mudd,
D., Morris, T., Hu, F., "Virtual SCADA
Systems for Cyber Security." 2015 IEEE International Conference
on Technologies for Homeland Security (HST 2015). April 14-16, 2015,
Waltham, MA, USA.
|
New
Lab on wireless power charging security |
Lab Instructions
|
Lab
Solutions
|
Lab Reading
Materials ( Document Slides)
|
Graduate
Student Course -
Title: ECE
600: Advanced CPS Security
(New Developed; To be offered in 2016)
|
Week
1 - Mobile Phone Security (I) |
Lecture 1 (2 hours): Challenges
in CPS Security (Slides) |
Lecture 2: Mobile Phone
Security Overview (Paper) |
Week
2- Mobile Phone Security (II) |
1 - Phone memory recovery (Paper Slides) |
Lecture 2 - Advanced memory
recovery (paper slides) |
Lecture 3 - Secure Mobile
Encounters (paper slides) |
Week
3 - Medical Device Security (I) |
Lecture 1 - Secure Implantable
Medical Decices (IMDs) - Overview (Slides) |
Lecture 2 - SoK: Secure
IMD and Medical Devices (Paper Slides) |
Week
4 - Medical Device Security (II) |
Lecture 1 - Ghost Talk (EMI
attack) (Paper Slides) |
Lecture 2 - They can hear
your heart beats (paper Slides) |
Lecture 3 - IMD Guard (paper
Slides) |
Week
5 - Wireless Pairing (I) |
Lecture 1 - Ally Friendly
Jamming (paper) |
Lecture 2 - Recurring Authentication
(paper) |
Lecture 3 - Uncoordinated
Frequency Hopping (paper slides) |
Week
6 - Wireless Pairing (II) |
Lecture 1 - Advancing Wireless
Link Signatures (paper slides) |
Lecture 2 - Secure In-Band
Wireless Pairing (paper) |
Lecture 3 - Physical Layer
keying (paper) |
Week
7 - Acoustic Security |
Lecture 1 - Dhwani: Secure
Peer-to-Peer Acoustic (paper slides) |
Lecture 2 -
Recognizing Speech from Gyroscope Signals (paper
slides) |
Lecture 3 -
Detecting Wireless Microphone Emulation Attacks (paper) |
Week
8 - Cloud Security (I) |
Lectures - Cloud Computing
Security (Overview) (slides) |
|
Week
9 - Cloud Security (II) |
Lecture 1 - Vanish: Increasing
Data Privacy with Self-Destructing Data (paper
slides) |
Lecture 2 -
HAIL: A High-Availability and Integrity Layer for Cloud Storage (paper
slides) |
Lecture 3 -
Hourglass Schemes: How to Prove that Cloud Files Are Encrypted(paper
slides) |
Week
10 - CRN Security |
Lecture 1 - PRIMARY USER
EMULATION ATTACK (paper slides) |
Lecture 2 -
Integrated Cryptographic andWireless Link Signatures (paper) |
Lecture 3 - Detecting Wireless
Microphone Emulation Attacks (paper) |
Week
11 - RFID Security |
Lecture 1 - RFID security
overview (slides) |
Lecture 2 - Unidirectional
Key Distribution Across Time and Space (paper) |
Lecture 3 - Research trend
(slides) |
Week
12 - Metering Security |
Lecture 1 - Metering in Smart
Grid (slides) |
Lecture 2 - Neighborhood
Watch: Security and Privacy Analysis (paper
slides) |
Lecture 3 - Multi-Sensor
Energy Theft Detection (paper) |
Week
13 - Data Security |
Lecture 1 - Worm Origin Identification
Using Random Moonwalks (paper slides) |
Lecture 2 - Casting out Demons:
Sanitizing Training Data for Anomaly Sensors (paper) |
Lecture 3 -
Detection of Denial-of-Message Attacks on Sensor Network Broadca (paper) |
Week
14 - Control Security |
Lecture 1 - Secure control
(overview) (slides) |
Lecture 2 - Process Control
attacks (paper) |
Lecture 3 - Smart Grid (slides) |
Week
15 - Graph-based Security Schemes |
Lecture 1 - Polygraph: Automatically
Generating Signatures (paper slides) |
Lecture 2 - Highly Predictive
Blacklisting (paper slides) |
Lecture 3 - BotGrep: Finding
P2P Bots with Structured Graph Analysis (paper) |