Cybersecurity

Cyber-Physical Simulation Platform for Security Assessment of the Transactive Energy Systems

Transactive energy systems (TES) are emerging as a transformative solution for the problems that distribution system operators face due to an increase in the use of distributed energy resources and rapid growth in scalability of managing active …

Efficient and Scalable Bug-Bounty Programs

Many organizations and companies have recently chosen to use so-called bug-bounty programs (also known as vulnerability reward programs), which allow outside security experts to evaluate the security of an organization’s products and services and to report security vulnerabilities in exchange for rewards.

VeriSolid: Correct-by-Design Smart Contracts for Ethereum

The adoption of blockchain based distributed ledgers is growing fast due to their ability to provide reliability, integrity, and auditability without trusted entities. One of the key capabilities of these emerging platforms is the ability to create …

Towards High-Resolution Multi-Stage Security Games

In recent years, we have seen a large number of cyber-incidents, which demonstrated how difficult it is to prevent cyber-breaches when facing determined and sophisticated attackers. In light of this, it is clear that defenders need to look beyond the …

Improving Network Connectivity and Robustness Using Trusted Nodes with Application to Resilient Consensus

To observe and control a networked system, especially in failure-prone circumstances, it is imperative that the underlying network structure is robust against node or link failures. A common approach for increasing network robustness is redundancy: …

TRANSAX: A Blockchain-based Decentralized Forward-Trading Energy Exchange for Transactive Microgrids

Power grids are undergoing major changes due to rapid growth in renewable energy and improvements in battery technology. Prompted by the increasing complexity of power systems, decentralized IoT solutions are emerging, which arrange local communities …

On the Assessment of Systematic Risk in Networked Systems

In a networked system, the risk of security compromises depends not only on each node’s security, but also on the topological structure formed by the connected individuals, businesses, and computer systems. Research in network security has been …

Cyber-Insurance as a Signaling Game: Self-Reporting and External Security Audits

An insurer has to know the risks faced by a potential client to accurately determine an insurance premium offer. However, while the potential client might have a good understanding of its own security practices, it may also have an incentive not to …

Synergistic Security for the Industrial Internet of Things: Integrating Redundancy, Diversity, and Hardening

As the Industrial Internet of Things (IIot) becomes more prevalent in critical application domains, ensuring security and resilience in the face of cyber-attacks is becoming an issue of paramount importance. Cyber-attacks against critical …

Application-Aware Anomaly Detection of Sensor Measurements in Cyber-Physical Systems

Detection errors such as false alarms and undetected faults are inevitable in any practical anomaly detection system. These errors can create potentially significant problems in the underlying application. In particular, false alarms can result in …