Table of Contents
|
Critical Infrastructure Protection XIII Jason Staggs, Sujeet Shenoi |
Front Matter |
Themes and Issues
|
Quantifying the Costs of Data Breaches Siddharth Dongre, Sumita Mishra, Carol Romanowski, Manan Buddhadev |
3-16 |
Infrastructure Protection
|
A Comparative Analysis Approach for Deriving Failure Scenarios in the Natural Gas Distribution Infrastructure Michael Locasto, David Balenson |
19-50 |
An Attack-Fault Tree Analysis of a Movable Railroad Bridge Matthew Jablonski, Yongxin Wang, Chaitanya Yavvari, Zezhou Wang, Xiang Liu, Keith Holt, Duminda Wijesekera |
51-71 |
Converting an Electric Power Utility Network to Defend Against Crafted Inputs Michael Millian, Prashant Anantharaman, Sergey Bratus, Sean Smith, Michael Locasto |
73-85 |
Cyber Security Modeling of Non-Critical Nuclear Power Plant Digital Instrumentation Trevor Maclean, Robert Borrelli, Michael Haney |
87-100 |
Vehicle Infrastructure Security
|
Electronic Control Unit Discrimination Using Wired Signal Distinct Native Attributes Rahn Lassiter, Scott Graham, Timothy Carbino, Stephen Dunlap |
103-121 |
Vehicle Identification and Route Reconstruction via TPMS Data Leakage Kenneth Hacker, Scott Graham, Stephen Dunlap |
123-136 |
Modeling Liability Data Collection Systems for Intelligent Transportation Infrastructure Using Hyperledger Fabric Luis Cintron, Scott Graham, Douglas Hodson, Barry Mullins |
137-156 |
Telecommunications Infrastructure Security
|
Securing Wireless Coprocessors from Attacks in the Internet of Things Jason Staggs, Sujeet Shenoi |
159-178 |
Vulnerability Assessment of InfiniBand Networking Daryl Schmitt, Scott Graham, Patrick Sweeney, Robert Mills |
179-205 |
Cyber-Physical Systems Security
|
Leveraging Cyber-Physical System Honeypots to Enhance Threat Intelligence Michael Haney |
209-233 |
Dynamic Repair of Mission-Critical Applications with Runtime Snap-Ins J. Brady, Sergey Bratus, Sean Smith |
235-252 |
Data-Driven Field Mapping of Security Logs for Integrated Monitoring Seungoh Choi, Yesol Kim, Jeong-Han Yun, Byung-Gil Min, Hyoung-Chun Kim |
253-268 |
Industrial Control Systems Security
|
Modeling and Machine-Checking Bump-in-the-Wire Security for Industrial Control Systems Mehdi Sabraoui, Jeffrey Hieb, Adrian Lauf, James Graham |
271-288 |
Defining Attack Patterns for Industrial Control Systems Raymond Chan, Kam-Pui Chow, Chun-Fai Chan |
289-309 |
An Incident Response Model for Industrial Control System Forensics Based on Historical Events Ken Yau, Kam-Pui Chow, Siu-Ming Yiu |
311-328 |