8 research outputs found
Effective fiber bandwidth utilization in TDM WDM optical networks
Ph.DDOCTOR OF PHILOSOPH
Active fuzzing for testing and securing cyber-physical systems
National Research Foundation (NRF) Singapore under its National Satellite of Excellence Programm
Enterprise Mobile Tracking and Reminder System: MAE
Mobile phones have made significant improvements from providing voice communications to advanced features such as camera, GPS, Wi-Fi, SMS, voice recognition, Internet surfing, and touch screen. This paper presents an enterprise mobile tracking and reminder system (MAE) that enables the elderly to have a better elder-care experience. The high-level architecture and major software algorithms especially the tracking in Android phones and SMS functions in server are described. The analysis of data captured and performance study of the server are discussed. In order to show the effectiveness of MAE, a pilot test was carried out with a retirement village in Singapore and the feedback from the elderly was evaluated. Generally, most comments received from the elderly were positive
Towards systematically deriving defence mechanisms from functional requirements of cyber-physical systems
The threats faced by cyber-physical systems (CPSs) in critical infrastructure
have motivated the development of different attack detection mechanisms, such
as those that monitor for violations of invariants, i.e. properties that always
hold in normal operation. Given the complexity of CPSs, several existing
approaches focus on deriving invariants automatically from data logs, but these
can miss possible system behaviours if they are not represented in that data.
Furthermore, resolving any design flaws identified in this process is costly,
as the CPS is already built. In this position paper, we propose a systematic
method for deriving invariants before a CPS is built by analysing its
functional requirements. Our method, inspired by the axiomatic design
methodology for systems, iteratively analyses dependencies in the design to
construct equations and process graphs that model the invariant relationships
between CPS components. As a preliminary study, we applied it to the design of
a water treatment plant testbed, implementing checkers for two invariants by
using decision trees, and finding that they could detect some examples of
attacks on the testbed with high accuracy and without false positives. Finally,
we explore how developing our method further could lead to more robust CPSs and
reduced costs by identifying design weaknesses before systems are implemented.Comment: Accepted by the ACM Cyber-Physical System Security Workshop (CPSS
2020
Deriving invariant checkers for critical infrastructure using axiomatic design principles
National Research Foundation (NRF) Singapor