{"id":"https://openalex.org/W4390188644","doi":"https://doi.org/10.1109/dasc/picom/cbdcom/cy59711.2023.10361334","title":"Revealing Ongoing Sensor Attacks in Industrial Control System Via Setpoint Modification","display_name":"Revealing Ongoing Sensor Attacks in Industrial Control System Via Setpoint Modification","publication_year":2023,"publication_date":"2023-11-14","ids":{"openalex":"https://openalex.org/W4390188644","doi":"https://doi.org/10.1109/dasc/picom/cbdcom/cy59711.2023.10361334"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/dasc/picom/cbdcom/cy59711.2023.10361334","pdf_url":null,"source":{"id":"https://openalex.org/S4363605881","display_name":"2021 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_indexed_in_scopus":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://wrap.warwick.ac.uk/183441/1/WRAP-revealing-ongoing-sensor-attacks-industrial-control-system-via-setpoint-modification-2024.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5069329132","display_name":"Zhihao Dai","orcid":"https://orcid.org/0000-0003-4007-6862"},"institutions":[{"id":"https://openalex.org/I39555362","display_name":"University of Warwick","ror":"https://ror.org/01a77tt86","country_code":"GB","type":"funder","lineage":["https://openalex.org/I39555362"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Zhihao Dai","raw_affiliation_strings":["Department of Computer Science, University of Warwick, Coventry, UK"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Warwick, Coventry, UK","institution_ids":["https://openalex.org/I39555362"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5064596191","display_name":"Ligang He","orcid":"https://orcid.org/0000-0002-5671-0576"},"institutions":[{"id":"https://openalex.org/I39555362","display_name":"University of Warwick","ror":"https://ror.org/01a77tt86","country_code":"GB","type":"funder","lineage":["https://openalex.org/I39555362"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Ligang He","raw_affiliation_strings":["Department of Computer Science, University of Warwick, Coventry, UK"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Warwick, Coventry, UK","institution_ids":["https://openalex.org/I39555362"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5010240403","display_name":"Shuang\u2010Hua Yang","orcid":"https://orcid.org/0000-0003-0717-5009"},"institutions":[{"id":"https://openalex.org/I71052956","display_name":"University of Reading","ror":"https://ror.org/05v62cm79","country_code":"GB","type":"funder","lineage":["https://openalex.org/I71052956"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Shuang-Hua Yang","raw_affiliation_strings":["Department of Computer Science, University of Reading, Reading, UK"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Reading, Reading, UK","institution_ids":["https://openalex.org/I71052956"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5016168339","display_name":"Matthew Leeke","orcid":null},"institutions":[{"id":"https://openalex.org/I79619799","display_name":"University of Birmingham","ror":"https://ror.org/03angcq70","country_code":"GB","type":"funder","lineage":["https://openalex.org/I79619799"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Matthew Leeke","raw_affiliation_strings":["School of Computer Science, University of Birmingham, Birmingham, UK"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, University of Birmingham, Birmingham, UK","institution_ids":["https://openalex.org/I79619799"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"fulltext_origin":"pdf","cited_by_count":0,"citation_normalized_percentile":{"value":0.0,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":0,"max":66},"biblio":{"volume":null,"issue":null,"first_page":"0191","last_page":"0199"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9986,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9986,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9974,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10876","display_name":"Fault Detection and Control Systems","score":0.9894,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/setpoint","display_name":"Set point","score":0.98655057},{"id":"https://openalex.org/keywords/benchmark","display_name":"Benchmark (surveying)","score":0.5962084},{"id":"https://openalex.org/keywords/industrial-control-system","display_name":"Industrial control system","score":0.503926}],"concepts":[{"id":"https://openalex.org/C12302492","wikidata":"https://www.wikidata.org/wiki/Q1752097","display_name":"Setpoint","level":2,"score":0.98655057},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6617613},{"id":"https://openalex.org/C185798385","wikidata":"https://www.wikidata.org/wiki/Q1161707","display_name":"Benchmark (surveying)","level":2,"score":0.5962084},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.5790062},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.5599655},{"id":"https://openalex.org/C40071531","wikidata":"https://www.wikidata.org/wiki/Q2513962","display_name":"Industrial control system","level":3,"score":0.503926},{"id":"https://openalex.org/C155386361","wikidata":"https://www.wikidata.org/wiki/Q1649571","display_name":"Process control","level":3,"score":0.45902118},{"id":"https://openalex.org/C61326573","wikidata":"https://www.wikidata.org/wiki/Q1496376","display_name":"Gaussian process","level":3,"score":0.45062828},{"id":"https://openalex.org/C2776214188","wikidata":"https://www.wikidata.org/wiki/Q408386","display_name":"Inference","level":2,"score":0.43645433},{"id":"https://openalex.org/C17500928","wikidata":"https://www.wikidata.org/wiki/Q959968","display_name":"Control system","level":2,"score":0.42723662},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.4051552},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.36999553},{"id":"https://openalex.org/C133731056","wikidata":"https://www.wikidata.org/wiki/Q4917288","display_name":"Control engineering","level":1,"score":0.36043498},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.34077418},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.3238955},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.27346846},{"id":"https://openalex.org/C163716315","wikidata":"https://www.wikidata.org/wiki/Q901177","display_name":"Gaussian","level":2,"score":0.22242278},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C13280743","wikidata":"https://www.wikidata.org/wiki/Q131089","display_name":"Geodesy","level":1,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C119599485","wikidata":"https://www.wikidata.org/wiki/Q43035","display_name":"Electrical engineering","level":1,"score":0.0},{"id":"https://openalex.org/C205649164","wikidata":"https://www.wikidata.org/wiki/Q1071","display_name":"Geography","level":0,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/dasc/picom/cbdcom/cy59711.2023.10361334","pdf_url":null,"source":{"id":"https://openalex.org/S4363605881","display_name":"2021 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_indexed_in_scopus":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},{"is_oa":true,"landing_page_url":"https://wrap.warwick.ac.uk/183441/1/WRAP-revealing-ongoing-sensor-attacks-industrial-control-system-via-setpoint-modification-2024.pdf","pdf_url":"https://wrap.warwick.ac.uk/183441/1/WRAP-revealing-ongoing-sensor-attacks-industrial-control-system-via-setpoint-modification-2024.pdf","source":{"id":"https://openalex.org/S4306400665","display_name":"Warwick Research Archive Portal (University of Warwick)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_indexed_in_scopus":false,"is_core":false,"host_organization":"https://openalex.org/I39555362","host_organization_name":"University of Warwick","host_organization_lineage":["https://openalex.org/I39555362"],"host_organization_lineage_names":["University of Warwick"],"type":"repository"},"license":null,"license_id":null,"version":"acceptedVersion","is_accepted":true,"is_published":false}],"best_oa_location":{"is_oa":true,"landing_page_url":"https://wrap.warwick.ac.uk/183441/1/WRAP-revealing-ongoing-sensor-attacks-industrial-control-system-via-setpoint-modification-2024.pdf","pdf_url":"https://wrap.warwick.ac.uk/183441/1/WRAP-revealing-ongoing-sensor-attacks-industrial-control-system-via-setpoint-modification-2024.pdf","source":{"id":"https://openalex.org/S4306400665","display_name":"Warwick Research Archive Portal (University of Warwick)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_indexed_in_scopus":false,"is_core":false,"host_organization":"https://openalex.org/I39555362","host_organization_name":"University of Warwick","host_organization_lineage":["https://openalex.org/I39555362"],"host_organization_lineage_names":["University of Warwick"],"type":"repository"},"license":null,"license_id":null,"version":"acceptedVersion","is_accepted":true,"is_published":false},"sustainable_development_goals":[],"grants":[],"datasets":[],"versions":[],"referenced_works_count":24,"referenced_works":["https://openalex.org/W2004186751","https://openalex.org/W2010001505","https://openalex.org/W2036033662","https://openalex.org/W2143288231","https://openalex.org/W2145416008","https://openalex.org/W2160049009","https://openalex.org/W2296719434","https://openalex.org/W2532554287","https://openalex.org/W2555431798","https://openalex.org/W2612690371","https://openalex.org/W2891273344","https://openalex.org/W2914584698","https://openalex.org/W2950361482","https://openalex.org/W2963445270","https://openalex.org/W3024669438","https://openalex.org/W3105640347","https://openalex.org/W3169450514","https://openalex.org/W3199573619","https://openalex.org/W3209929740","https://openalex.org/W4212795178","https://openalex.org/W4283318673","https://openalex.org/W4312433903","https://openalex.org/W4318486034","https://openalex.org/W4318969743"],"related_works":["https://openalex.org/W90946887","https://openalex.org/W4205962020","https://openalex.org/W3155069932","https://openalex.org/W3004171367","https://openalex.org/W2994131054","https://openalex.org/W2620138946","https://openalex.org/W2004331170","https://openalex.org/W191702426","https://openalex.org/W1892941422","https://openalex.org/W1495927848"],"abstract_inverted_index":{"A":[0],"variety":[1],"of":[2,41,57,128,145,207],"Intrusion":[3],"Detection":[4],"Systems":[5,10],"(IDSs)":[6],"for":[7,142],"Industrial":[8],"Control":[9],"have":[11,43],"been":[12],"proposed":[13,153],"to":[14,46,68,95,111],"detect":[15],"attacks":[16,130,147],"and":[17,21,88,100,160,203],"alert":[18],"operators.":[19],"Passive":[20],"active":[22,143],"detection":[23,170,201],"schemes":[24],"are":[25],"characterised":[26],"by":[27,107],"whether":[28],"or":[29,54],"not":[30],"they":[31],"interact":[32],"with":[33,115],"the":[34,51,55,109,125,166,173,191,205],"process":[35,52],"under":[36,176],"control,":[37,117],"though":[38],"both":[39],"categories":[40],"approach":[42,73,110,167],"limitations":[44],"relating":[45],"either":[47],"known":[48],"correlations":[49,85],"in":[50,82,148],"data":[53],"use":[56],"explicit":[58],"system":[59,114],"modelling.":[60],"We":[61,104],"propose":[62],"setpoint":[63,78,208],"modification":[64],"as":[65],"a":[66,112,149,158],"strategy":[67,154],"address":[69],"those":[70],"limitations.":[71],"The":[72,152],"superimposes":[74],"Gaussian":[75],"noises":[76],"on":[77,134],"values,":[79],"which":[80,198],"aids":[81],"revealing":[83],"latent":[84],"between":[86],"setpoints":[87,188],"measurements,":[89],"thereby":[90],"allowing":[91],"machine":[92],"learning-based":[93],"IDSs":[94,141],"learn":[96],"them":[97],"during":[98,102],"training":[99],"verify":[101],"inference.":[103],"show":[105],"that":[106,124,165],"applying":[108],"linear":[113],"PID":[116],"statistical":[118],"tests":[119],"can":[120],"be":[121],"configured":[122],"such":[123],"distortion":[126],"power":[127],"sensor":[129,146,175],"is":[131,155,178],"nullified.":[132],"Building":[133],"this":[135],"foundation,":[136],"we":[137,185],"further":[138],"adapt":[139],"passive":[140],"discovery":[144],"process-agnostic":[150],"fashion.":[151],"evaluated":[156],"using":[157],"nonlinear":[159],"simulated":[161],"industrial":[162],"benchmark,":[163],"affirming":[164],"enhances":[168],"intrusion":[169],"performance":[171,202],"when":[172,190],"specific":[174],"consideration":[177],"targeted":[179],"whilst":[180],"incurring":[181],"marginal":[182],"cost.":[183],"Finally,":[184],"explore":[186],"changing":[187],"concurrently":[189],"attacker":[192],"could":[193],"manipulate":[194],"an":[195],"arbitrary":[196],"sensor,":[197],"also":[199],"boosts":[200],"motivates":[204],"exploration":[206],"selection.":[209]},"abstract_inverted_index_v3":null,"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W4390188644","counts_by_year":[],"updated_date":"2025-02-19T14:01:14.766928","created_date":"2023-12-26"}