SUTD-ASPIRE

aspire-logo-square-medium

As part of the iTrust center, I am leading two research tasks in SUTD-ASPIRE: Advancing Security of Public Infrastructure using Economics and Resilience. I will lead T3: Orthogonal Defenses, and T4: Attacker Models.

 

SUTD-ASPIRE
Status: Funded, starting 2015/01/01
Funding: 5.3M SGD
Role: Co-PI
Duration: 4 Years

Our objective is to conduct fundamental scientific research to improve the security of Cyber-Physical Systems (CPS) that offer key services such as power. Our contributions will be: (a) principles, techniques, and software tools, and (b) validation of principles and design techniques through experiments using SUTD’s realistic testbeds. Together with our public and private partners, we ensure that the outcomes of the proposed research will have real-world impact. Consequently, our work will benefit Singapore along three dimensions: government interests, commercial interests and manpower development.

Research Tasks
grid
Test Beds
As part of SUTD-ASPIRE, several research test beds are planned. The test beds will faithfully replicate industrial control systems and processes in the context of electric power networks and water treatment. All test beds will be constructed at the new East-Coast Campus of SUTD.

Publications

2018

  • [DOI] R. Taormina, S. Galelli, N. O. Tippenhauer, E. Salomons, A. Ostfeld, D. G. Eliades, M. Aghashahi, R. Sundararajan, M. Pourahmadi, K. M. Banks, B. M. Brentan, M. Herrera, A. Rasekh, E. Campbell, I. Montalvo, G. Lima, J. Izquierdo, K. Haddad, N. Gatsis, A. Taha, S. L. Somasundaram, D. Ayala-Cabrera, S. E. Chandy, B. Campbell, P. Biswas, C. S. Lo, D. Manzi, E. Luvizotto Jr, Z. A. Barker, M. Giacomoni, F. M. K. Pasha, E. M. Shafiee, A. A. Abokifa, M. Housh, B. Kc, and Z. Ohar, “The Battle Of The Attack Detection Algorithms: Disclosing Cyber Attacks On Water Distribution Networks,” Journal of Water Resources Planning and Management, 2018.
    [Bibtex]
    @article{taormina18battle,
    author={Taormina, Riccardo and Galelli, Stefano and Tippenhauer, Nils Ole and Salomons, Elad and Ostfeld, Avi and Eliades, Demetrios G. and Aghashahi, Mohsen and Sundararajan, Raanju and Pourahmadi, Mohsen and Banks, M. Katherine and Brentan, B. M. and Herrera, M. and Rasekh, Amin and Campbell, Enrique and Montalvo, I. and Lima, G. and Izquierdo, J. and Haddad, Kelsey and Gatsis, Nikolaos and Taha, Ahmad and Somasundaram, Saravanakumar Lakshmanan and Ayala-Cabrera, D. and Chandy, Sarin E. and Campbell, Bruce and Biswas, Pratim and Lo, Cynthia S. and Manzi, D. and Luvizotto, Jr, E. and Barker, Zachary A. and Giacomoni, Marcio and Pasha, M. Fayzul K. and Shafiee, M. Ehsan and Abokifa, Ahmed A. and Housh, Mashor and Kc, Bijay and Ohar, Ziv},
    title={The Battle Of The Attack Detection Algorithms: Disclosing Cyber Attacks On Water Distribution Networks},
    journal={Journal of Water Resources Planning and Management},
    year={2018},
    publisher={ASCE},
    doi={10.1061/(ASCE)WR.1943-5452.0000969},
    month={December}}

2017

  • [DOI] D. Antonioli, H. R. Ghaeini, S. Adepu, M. Ochoa, and N. O. Tippenhauer, “Gamifying ICS Security Training and Research: Design, Implementation, and Results of S3,” in Proceedings of Workshop on Cyber-Physical Systems Security & Privacy (SPC-CPS), co-located with CCS, 2017.
    [Bibtex]
    @inproceedings{antonioli17s3,
    author={Antonioli, Daniele and Ghaeini, Hamid Reza and Adepu, Sridhar and Ochoa, Mart{\'i}n and Tippenhauer, Nils Ole},
    title={Gamifying {ICS} Security Training and Research: Design, Implementation, and Results of {S3}},
    booktitle={Proceedings of Workshop on Cyber-Physical Systems Security \& Privacy (SPC-CPS), co-located with CCS},
    month={November},
    year={2017},
    doi={10.1145/3140241.3140253}}
  • [DOI] M. Rocchetto and N. O. Tippenhauer, “Towards Formal Security Analysis of Industrial Control Systems,” in Proceedings of the ACM Asia Conference on Computer and Communications Security (ASIACCS), 2017.
    [Bibtex]
    @inproceedings{towards17rocchetto,
    author={Rocchetto, Marco and Tippenhauer, Nils Ole},
    title={Towards Formal Security Analysis of Industrial Control Systems},
    booktitle={Proceedings of the ACM Asia Conference on Computer and Communications Security (ASIACCS)},
    month={April},
    year={2017},
    doi={10.1145/3052973.3053024}}

2016

  • [DOI] R. Taormina, S. Galelli, N. O. Tippenhauer, E. Salomons, and A. Ostfeld, “Characterizing Cyber-Physical Attacks on Water Distribution Systems,” Journal of Water Resources Planning and Management, vol. 143, 2016.
    [Bibtex]
    @article{taormina16characterizing,
    author={Taormina, Riccardo and Galelli, Stefano and Tippenhauer, Nils Ole and Salomons, Elad and Ostfeld, Avi},
    title={Characterizing Cyber-Physical Attacks on Water Distribution Systems},
    publisher={ASCE},
    year={2016},
    volume={143},
    issue={5},
    doi={10.1061/(ASCE)WR.1943-5452.0000749},
    journal={Journal of Water Resources Planning and Management},
    month={December}}
  • [DOI] M. Rocchetto and N. O. Tippenhauer, “CPDY: Extending the Dolev-Yao Attacker with Physical-Layer Interactions,” in Proceedings of the International Conference on Formal Engineering Methods (ICFEM), 2016.
    [Bibtex]
    @inproceedings{rocchetto16cpdy,
    author={Rocchetto, Marco and Tippenhauer, Nils Ole},
    year={2016},
    booktitle={Proceedings of the International Conference on Formal Engineering Methods (ICFEM)},
    title={{CPDY}: Extending the {Dolev-Yao} Attacker with Physical-Layer Interactions},
    month={October},
    doi={10.1007/978-3-319-47846-3_12}}
  • [DOI] M. Rocchetto and N. O. Tippenhauer, “On Attacker Models and Profiles for Cyber-Physical Systems,” in Proceedings of the European Symposium on Research in Computer Security (ESORICS), 2016.
    [Bibtex]
    @inproceedings{rocchetto16models,
    author={Rocchetto, Marco and Tippenhauer, Nils Ole},
    Title={On Attacker Models and Profiles for Cyber-Physical Systems},
    Booktitle={Proceedings of the European Symposium on Research in Computer Security (ESORICS)},
    month={September},
    year={2016},
    doi={10.1007/978-3-319-45741-3_22}}
  • [DOI] R. Taormina, S. Galelli, N. O. Tippenhauer, E. Salomons, and A. Ostfeld, “Assessing the effect of cyber-physical attacks on water distribution systems,” in Proceedings of World Congress on Environmental & Water Resources (EWRI), 2016.
    [Bibtex]
    @inproceedings{taormina16assessing,
    author={Taormina, Riccardo and Galelli, Stefano and Tippenhauer, Nils Ole and Salomons, Elad and Ostfeld, Avi},
    title={Assessing the effect of cyber-physical attacks on water distribution systems},
    booktitle={Proceedings of World Congress on Environmental \& Water Resources (EWRI)},
    month={May},
    doi={10.1061/9780784479865.046},
    year={2016}}
  • N. O. Tippenhauer, M. Ochoa, and A. Mathur, “Water Treatment, Distribution, and Electric Power Testbeds for Research in the Design of Secure Interdependent Critical Infrastructures,” in Proceedings of Workshop on Security and Resilience of Cyber-Physical Infrastructures (SERECIN), 2016.
    [Bibtex]
    @inproceedings{tippenhauer16testbeds,
    author={Tippenhauer, Nils Ole and Ochoa, Martin and Mathur, Aditya},
    title={Water Treatment, Distribution, and Electric Power Testbeds for Research in the Design of Secure Interdependent Critical Infrastructures},
    booktitle={Proceedings of Workshop on Security and Resilience of Cyber-Physical Infrastructures (SERECIN)},
    month={April},
    url={https://sites.google.com/site/serecin2016/programme/proceedings/serecin_2016.pdf},
    year={2016}}
  • [DOI] R. Taormina, S. Galelli, N. O. Tippenhauer, E. Salomons, and A. Ostfeld, “Simulation of Cyber-Physical Attacks on Water Distribution Systems with EPANET,” in Proceedings of Singapore Cyber Security Conference (SG-CRC), 2016.
    [Bibtex]
    @inproceedings{taormina16simulation,
    author={Taormina, Riccardo and Galelli, Stefano and Tippenhauer, Nils Ole and Salomons, Elad and Ostfeld, Avi},
    title={Simulation of Cyber-Physical Attacks on Water Distribution Systems with {EPANET}},
    booktitle={Proceedings of Singapore Cyber Security Conference (SG-CRC)},
    month={January},
    year={2016},
    doi={10.3233/978-1-61499-617-0-123}}