Home
Posts
Projects
Talks
Publications
Contact
1
Physical Logic Bombs in 3D Printers via Emerging 4D Techniques
Rapid prototyping makes additive manufacturing (or 3D printing)useful in critical application domains such as aerospace, automotive, …
Tuan Le
,
Sriharsha Etigowni
,
Sizhuang Liang
,
Xirui Peng
,
Jerry Qi
,
Mehdi Javanmard
,
Saman Zonouz
,
Raheem Beyah
Physics-Aware Security Monitoring against Structural Integrity Attacks in 3D Printers
STereoLithography (STL) files describe the geometry of objects to be printed in additive manufacturing. Previous studies have shown …
Sriharsha Etigowni
,
Sizhuang Liang
,
Saman Zonouz
,
Raheem Beyah
Cite
Forensic Investigation of Industrial Control Systems Using Deterministic Replay
From manufacturing plants to power grids, industrial control systems are increasingly controlled and networked digitally. While …
Gregory Walkup
,
Sriharsha Etigowni
,
Dongyan Xu
,
Vincent Urias
,
Han W Lin
Cite
Fast Generation Redispatch Techniques for Automated Remedial Action Schemes
To ensure power system operational security, it not only requires security incident detection, but also automated intrusion response …
Hao Huang
,
Maryam Kazerooni
,
Shamina Hossain-McKenzie
,
Sriharsha Etigowni
,
Saman Zonouz
,
Katherine Davis
Cite
Crystal (ball) I Look at Physics and Predict Control Flow! Just-Ahead-Of-Time Controller Recovery
Recent major attacks against unmanned aerial vehicles (UAV) and their controller software necessitate domain-specific cyber-physical …
Sriharsha Etigowni
,
Shamina Hossain-McKenzie
,
Maryam Kazerooni
,
Katherine Davis
,
Saman Zonouz
Cite
Algorithmic attack synthesis using hybrid dynamics of power grid critical infrastructures
Automated vulnerability assessment and exploit generation for computing systems have been explored for decades. However, these …
Zhenqi Huang
,
Sriharsha Etigowni
,
Luis Garcia
,
Sayan Mitra
,
Saman Zonouz
Cite
Watch me, but don't touch me! contactless control flow monitoring via electromagnetic emanations
Trustworthy operation of industrial control systems depends on secure and real-time code execution on the embedded programmable logic …
Yi Han
,
Sriharsha Etigowni
,
Hua Liu
,
Saman Zonouz
,
Athina Petropulu
Cite
Cyber-air-gapped detection of controller attacks through physical interdependencies
Trustworthy operation of the power grid critical infrastructures requires real-time intrusion detection systems to identify compromised …
Sriharsha Etigowni
,
Mehmet Cintuglu
,
Maryam Kazerooni
,
Shamina Hossain
,
Pengfei Sun
,
Katherine Davis
,
Osama Mohammed
,
Saman Zonouz
Cite
Distributed controller role and interaction discovery
Distributed controllers have a ubiquitous presence in the electric power grid and play a prominent role in its daily operation. The …
Shamina Hossain-McKenzie
,
Katherine Davis
,
Maryam Kazerooni
,
Sriharsha Etigowni
,
Saman Zonouz
Cite
Improving power system neural network construction using modal analysis
Historically, the structure of an Artificial Neural Network (ANN) has been defined through trial-and-error or excessive computation …
Joshua Johnson
,
Shamina Hossain-McKenzie
,
Uyen Bui
,
Sriharsha Etigowni
,
Katherine Davis
,
Saman Zonouz
Cite
»
Cite
×