Project SAFE

Security Assessment and Forensic Examination

In recent years, the cyber-security of large-scale heterogeneous engineered systems such as public infrastructure and other distributed control systems has become an important problem.

In this project, we  develop methods to perform practical and theoretical security assessments of devices typically found in such networks. In addition, we  design strategies to detect and investigate past attacks.
Status: Started 2014/08/01
Funding: 100k SGD
Role: PI
Duration: 3 Years

Publications

2018

  • H. R. Ghaeini, D. Antonioli, F. Brasser, A. Sadeghi, and N. O. Tippenhauer, “State-Aware Anomaly Detection for Industrial Control Systems,” in Proceedings of Security Track at the ACM Symposium on Applied Computing (SAC), 2018.
    [Bibtex]
    @inproceedings{ghaeini18stateaware,
    author={Ghaeini, Hamid Reza and Antonioli, Daniele and Brasser, Ferdinand and Sadeghi, Ahmad-Reza and Tippenhauer, Nils Ole},
    title={State-Aware Anomaly Detection for Industrial Control Systems},
    booktitle={Proceedings of Security Track at the ACM Symposium on Applied Computing (SAC)},
    month={April},
    year={2018}}

2017

  • D. Antonioli, H. R. Ghaeini, S. Adepu, M. Ochoa, and N. O. Tippenhauer, “Gamifying ICS Security Training and Research: Design, Implementation, and Results of S3,” in Proceedings of Workshop on Cyber-Physical Systems Security & Privacy (SPC-CPS), co-located with CCS, 2017.
    [Bibtex]
    @inproceedings{antonioli17s3,
    author={Antonioli, Daniele and Ghaeini, Hamid Reza and Adepu, Sridhar and Ochoa, Mart{\'i}n and Tippenhauer, Nils Ole},
    title={Gamifying ICS Security Training and Research: Design, Implementation, and Results of S3},
    booktitle={Proceedings of Workshop on Cyber-Physical Systems Security \& Privacy (SPC-CPS), co-located with CCS},
    month={November},
    year={2017}}
  • N. Govil, A. Agrawal, and N. O. Tippenhauer, “On Ladder Logic Bombs in Industrial Control Systems,” in Proceedings of the Workshop on the Security of Industrial Control Systems and of Cyber-Physical Systems (CyberICPS), co-located with ESORICS, 2017.
    [Bibtex]
    @inproceedings{govil17ladder,
    author={Govil, Naman and Agrawal, Anand and Tippenhauer, Nils Ole},
    title={On Ladder Logic Bombs in Industrial Control Systems},
    Booktitle={Proceedings of the Workshop on the Security of Industrial Control Systems and of Cyber-Physical Systems (CyberICPS), co-located with ESORICS},
    month={September},
    year={2017}}
  • [DOI] J. H. Castellanos, D. Antonioli, N. O. Tippenhauer, and M. Ochoa, “Legacy-Compliant Data Authentication for Industrial Control System Traffic,” in Proceedings of the Conference on Applied Cryptography and Network Security (ACNS), 2017.
    [Bibtex]
    @inproceedings{castellanos17legacy,
    author={Castellanos, John Henry and Antonioli, Daniele and Tippenhauer, Nils Ole and Ochoa, Mart{\'i}n},
    title={Legacy-Compliant Data Authentication for Industrial Control System Traffic},
    booktitle={Proceedings of the Conference on Applied Cryptography and Network Security (ACNS)},
    month={July},
    year={2017},
    doi={10.1007/978-3-319-61204-1_33}}

2016

  • [DOI] K. Jansen, N. O. Tippenhauer, and C. Pöpper, “Multi-Receiver GPS Spoofing Detection: Error Models and Realization,” in Proceedings of the Annual Computer Security Applications Conference (ACSAC), 2016.
    [Bibtex]
    @inproceedings{jansen16gps,
    author={Jansen, Kai and Tippenhauer, Nils Ole and P\"opper, Christina},
    title={Multi-Receiver {GPS} Spoofing Detection: Error Models and Realization},
    booktitle={Proceedings of the Annual Computer Security Applications Conference (ACSAC)},
    month={December},
    doi={10.1145/2991079.2991092},
    year={2016}}
  • [DOI] N. O. Tippenhauer, K. B. Rasmussen, and S. Capkun, “Physical-Layer Integrity for Wireless Messages,” Computer Networks, vol. 109, iss. 1, pp. 31-38, 2016.
    [Bibtex]
    @article{tippenhauer16integrity,
    author={Tippenhauer, Nils Ole and Rasmussen, Kasper Bonne and Capkun, Srdjan},
    title={Physical-Layer Integrity for Wireless Messages},
    journal={Computer Networks},
    volume={109},
    number={1},
    pages={31--38},
    year={2016},
    month={November},
    issn={1389-1286},
    publisher={Elsevier},
    doi={10.1016/j.comnet.2016.06.021}}
  • [DOI] H. Ghaeini and N. O. Tippenhauer, “HAMIDS: Hierarchical Monitoring Intrusion Detection System for Industrial Control Systems,” in Proceedings of Workshop on Cyber-Physical Systems Security & Privacy (SPC-CPS), co-located with CCS, 2016.
    [Bibtex]
    @inproceedings{ghaeini16hamids,
    author={Ghaeini, Hamid and Tippenhauer, Nils Ole},
    title={{HAMIDS}: Hierarchical Monitoring Intrusion Detection System for Industrial Control Systems},
    booktitle={Proceedings of Workshop on Cyber-Physical Systems Security \& Privacy (SPC-CPS), co-located with CCS},
    month={October},
    doi={10.1145/2994487.2994492},
    year={2016}}
  • [DOI] X. Dong, S. Jauhar, W. G. Temple, B. Chen, Z. Kalbarczyk, W. H. Sanders, N. O. Tippenhauer, and D. M. Nicol, “The Right Tool for the Job: a Case for Common Input Scenarios for Security Assessment,” in Proceedings of Workshop on Graphical Models for Security (GraMSec), 2016.
    [Bibtex]
    @inproceedings{dong16cissa,
    author={Dong, Xinshu and Jauhar, Sumeet and Temple, William G. and Chen, Binbin and Kalbarczyk, Zbigniew and Sanders, William H. and Tippenhauer, Nils Ole and Nicol, David M.},
    title={The Right Tool for the Job: a Case for Common Input Scenarios for Security Assessment},
    booktitle={Proceedings of Workshop on Graphical Models for Security (GraMSec)},
    month={June},
    doi={10.1007/978-3-319-46263-9_3},
    year={2016}}

2015

  • [DOI] N. O. Tippenhauer, H. Luecken, M. Kuhn, and S. Capkun, “UWB Rapid-Bit-Exchange System for Distance Bounding,” in Proceedings of the ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec), 2015.
    [Bibtex]
    @inproceedings{tippenhauer15uwb,
    author={Tippenhauer, Nils Ole and Luecken, Heinrich and Kuhn, Marc and Capkun, Srdjan},
    title={{UWB} Rapid-Bit-Exchange System for Distance Bounding},
    booktitle={Proceedings of the ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec)},
    month={June},
    year={2015},
    doi={10.1145/2766498.2766504}}