scispace - formally typeset
C

Cheolhyeon Kwon

Researcher at Purdue University

Publications -  35
Citations -  683

Cheolhyeon Kwon is an academic researcher from Purdue University. The author has contributed to research in topics: Cyber-physical system & Cyber-attack. The author has an hindex of 9, co-authored 30 publications receiving 511 citations. Previous affiliations of Cheolhyeon Kwon include Ulsan National Institute of Science and Technology.

Papers
More filters
Proceedings ArticleDOI

Security analysis for Cyber-Physical Systems against stealthy deception attacks

TL;DR: This paper investigates three kinds of stealthy deception attacks according to the attacker's ability to compromise the system, and derives the necessary and sufficient conditions under which the attacker could perform each kind of attack without being detected.
Journal ArticleDOI

Analysis and Design of Stealthy Cyber Attacks on Unmanned Aerial Systems

TL;DR: This paper investigates the worst stealthy cyber attack that can maximize the state estimation error of the unmanned aerial system’s state estimator while not being detected.
Journal ArticleDOI

Reachability Analysis for Safety Assurance of Cyber-Physical Systems Against Cyber Attacks

TL;DR: An algorithm to assess the safety of the cyber-physical system (CPS) in the presence of cyber attacks, which can be designed intelligently to avoid the detection and can significantly enhance the quality of the online safety assessment.
Journal ArticleDOI

Cyber attack mitigation for cyber–physical systems: hybrid system approach to controller design

TL;DR: A method for designing the secure switching logic to counter possible cyber attacks and to mathematically verify the system's performance and stability as well is proposed.
Journal ArticleDOI

Real-Time Safety Assessment of Unmanned Aircraft Systems Against Stealthy Cyber Attacks

TL;DR: A controls domain approach extending beyond the computing resources of the unmanned aircraft system to include the underlying physical behavior of the compromised system, successfully complementing the traditional computer security architecture is considered.