C
Cheolhyeon Kwon
Researcher at Purdue University
Publications - 35
Citations - 683
Cheolhyeon Kwon is an academic researcher from Purdue University. The author has contributed to research in topics: Cyber-physical system & Cyber-attack. The author has an hindex of 9, co-authored 30 publications receiving 511 citations. Previous affiliations of Cheolhyeon Kwon include Ulsan National Institute of Science and Technology.
Papers
More filters
Proceedings ArticleDOI
Security analysis for Cyber-Physical Systems against stealthy deception attacks
TL;DR: This paper investigates three kinds of stealthy deception attacks according to the attacker's ability to compromise the system, and derives the necessary and sufficient conditions under which the attacker could perform each kind of attack without being detected.
Journal ArticleDOI
Analysis and Design of Stealthy Cyber Attacks on Unmanned Aerial Systems
TL;DR: This paper investigates the worst stealthy cyber attack that can maximize the state estimation error of the unmanned aerial system’s state estimator while not being detected.
Journal ArticleDOI
Reachability Analysis for Safety Assurance of Cyber-Physical Systems Against Cyber Attacks
Cheolhyeon Kwon,Inseok Hwang +1 more
TL;DR: An algorithm to assess the safety of the cyber-physical system (CPS) in the presence of cyber attacks, which can be designed intelligently to avoid the detection and can significantly enhance the quality of the online safety assessment.
Journal ArticleDOI
Cyber attack mitigation for cyber–physical systems: hybrid system approach to controller design
Cheolhyeon Kwon,Inseok Hwang +1 more
TL;DR: A method for designing the secure switching logic to counter possible cyber attacks and to mathematically verify the system's performance and stability as well is proposed.
Journal ArticleDOI
Real-Time Safety Assessment of Unmanned Aircraft Systems Against Stealthy Cyber Attacks
TL;DR: A controls domain approach extending beyond the computing resources of the unmanned aircraft system to include the underlying physical behavior of the compromised system, successfully complementing the traditional computer security architecture is considered.