1

Pitfalls for Security Isolation in Multi-CPU Systems

Add the full text or supplementary notes for the publication here using Markdown formatting.

GDMA: Fully Automated DMA Rehosting via Iterative Type Overlays

Add the full text or supplementary notes for the publication here using Markdown formatting.

ConfuSense: Sensor Reconfiguration Attacks for Stealthy UAV Manipulation

Add the full text or supplementary notes for the publication here using Markdown formatting.

FASER-IN: Evasion of Network Intrusion Detection Systems in Industrial Networks

Add the full text or supplementary notes for the publication here using Markdown formatting.

PreFence: A Fine-Grained and Scheduling-Aware Defense Against Prefetching-Based Attacks

Add the full text or supplementary notes for the publication here using Markdown formatting.

On Practical Realization of Evasion Attacks for Industrial Control Systems

A Thorough Cybersecurity Dataset for Intrusion Detection in Smart Water Networks

Add the full text or supplementary notes for the publication here using Markdown formatting.

Enabling Uncooperative Physical Localization in Cellular Networks

FieldFuzz: In Situ Blackbox Fuzzing of Proprietary Industrial Automation Runtimes via the Network

Blind Concealment from Reconstruction-based Attack Detectors for Industrial Control Systems via Backdoor Attacks