Run-time monitoring is a powerful approach for dynamically detecting faults or malicious activity of software systems. However, there are often two obstacles to the implementation...
Natalia Stakhanova, Samik Basu, Robyn R. Lutz, Joh...
The ever-increasing capabilities (processing power, memory, connectivity, display, etc.) of personal devices such as PDAs and mobile phones, as well as their convergence, have ena...
Michael Przybilski, Stefano Campadello, Titos Sari...
Privilege separation partitions a single program into two parts: a privileged program called the monitor and an unprivileged program called the slave. All trust and privileges are...
In this paper we address the problem of physical node capture attacks in wireless sensor networks and provide a control theoretic framework to model physical node capture, cloned n...
Abstract—Fault detection plays an indispensable role in ensuring the security of smart grid systems. Based on the dynamics of the generators, we show the time evolution of the sm...