NSF Project on Higher Education on CPS Security (Year 2 Outcomes)
During Sep 2014-Aug 2015, the following outcomes have been achieved:
Publications

[1] Fei Hu, Thomas H. Morris, Debra M. McCallum, Hongbo Zhou, "Towards a Multimedia-based Virtual Classroom on Cyber-Physical System (CPS) Security Education for Both City and Rural Schools," ASEE 2015, Seattle, WA, USA, June 14-17, 2015.

[2] Thornton, Z., Mudd, D., Morris, T., Hu, F., "Virtual SCADA Systems for Cyber Security." 2015 IEEE International Conference on Technologies for Homeland Security (HST 2015). April 14-16, 2015, Waltham, MA, USA.

New Lab on wireless power charging security
Lab Instructions

Lab Solutions

Lab Reading Materials ( Document Slides)

Graduate Student Course -

Title: ECE 600: Advanced CPS Security

(New Developed; To be offered in 2016)

Week 1 - Mobile Phone Security (I)
Lecture 1 (2 hours): Challenges in CPS Security (Slides)
Lecture 2: Mobile Phone Security Overview (Paper)
Week 2- Mobile Phone Security (II)
1 - Phone memory recovery (Paper Slides)
Lecture 2 - Advanced memory recovery (paper slides)
Lecture 3 - Secure Mobile Encounters (paper slides)
Week 3 - Medical Device Security (I)
Lecture 1 - Secure Implantable Medical Decices (IMDs) - Overview (Slides)
Lecture 2 - SoK: Secure IMD and Medical Devices (Paper Slides)
Week 4 - Medical Device Security (II)
Lecture 1 - Ghost Talk (EMI attack) (Paper Slides)
Lecture 2 - They can hear your heart beats (paper Slides)
Lecture 3 - IMD Guard (paper Slides)
Week 5 - Wireless Pairing (I)
Lecture 1 - Ally Friendly Jamming (paper)
Lecture 2 - Recurring Authentication (paper)
Lecture 3 - Uncoordinated Frequency Hopping (paper slides)
Week 6 - Wireless Pairing (II)
Lecture 1 - Advancing Wireless Link Signatures (paper slides)
Lecture 2 - Secure In-Band Wireless Pairing (paper)
Lecture 3 - Physical Layer keying (paper)
Week 7 - Acoustic Security
Lecture 1 - Dhwani: Secure Peer-to-Peer Acoustic (paper slides)
Lecture 2 - Recognizing Speech from Gyroscope Signals (paper slides)
Lecture 3 - Detecting Wireless Microphone Emulation Attacks (paper)
Week 8 - Cloud Security (I)
Lectures - Cloud Computing Security (Overview) (slides)
 
Week 9 - Cloud Security (II)
Lecture 1 - Vanish: Increasing Data Privacy with Self-Destructing Data (paper slides)
Lecture 2 - HAIL: A High-Availability and Integrity Layer for Cloud Storage (paper slides)
Lecture 3 - Hourglass Schemes: How to Prove that Cloud Files Are Encrypted(paper slides)
Week 10 - CRN Security
Lecture 1 - PRIMARY USER EMULATION ATTACK (paper slides)
Lecture 2 - Integrated Cryptographic andWireless Link Signatures (paper)
Lecture 3 - Detecting Wireless Microphone Emulation Attacks (paper)
Week 11 - RFID Security
Lecture 1 - RFID security overview (slides)
Lecture 2 - Unidirectional Key Distribution Across Time and Space (paper)
Lecture 3 - Research trend (slides)
Week 12 - Metering Security
Lecture 1 - Metering in Smart Grid (slides)
Lecture 2 - Neighborhood Watch: Security and Privacy Analysis (paper slides)
Lecture 3 - Multi-Sensor Energy Theft Detection (paper)
Week 13 - Data Security
Lecture 1 - Worm Origin Identification Using Random Moonwalks (paper slides)
Lecture 2 - Casting out Demons: Sanitizing Training Data for Anomaly Sensors (paper)
Lecture 3 - Detection of Denial-of-Message Attacks on Sensor Network Broadca (paper)
Week 14 - Control Security
Lecture 1 - Secure control (overview) (slides)
Lecture 2 - Process Control attacks (paper)
Lecture 3 - Smart Grid (slides)
Week 15 - Graph-based Security Schemes
Lecture 1 - Polygraph: Automatically Generating Signatures (paper slides)
Lecture 2 - Highly Predictive Blacklisting (paper slides)
Lecture 3 - BotGrep: Finding P2P Bots with Structured Graph Analysis (paper)