D
David I. Urbina
Researcher at University of Texas at Dallas
Publications - 9
Citations - 879
David I. Urbina is an academic researcher from University of Texas at Dallas. The author has contributed to research in topics: Industrial control system & Intrusion detection system. The author has an hindex of 7, co-authored 9 publications receiving 646 citations.
Papers
More filters
Journal ArticleDOI
A Survey of Physics-Based Attack Detection in Cyber-Physical Systems
Jairo Giraldo,David I. Urbina,Alvaro A. Cardenas,Junia Valente,Mustafa Amir Faisal,Justin Ruths,Nils Ole Tippenhauer,Henrik Sandberg,Richard Candell +8 more
TL;DR: Previous work on physics-based anomaly detection based on a unified taxonomy that allows us to identify limitations and unexplored challenges and to propose new solutions is reviewed.
Proceedings ArticleDOI
Limiting the Impact of Stealthy Attacks on Industrial Control Systems
David I. Urbina,Jairo Giraldo,Alvaro A. Cardenas,Nils Ole Tippenhauer,Junia Valente,Mustafa Amir Faisal,Justin Ruths,Richard Candell,Henrik Sandberg +8 more
TL;DR: The impact of stealthy attacks can be mitigated in several cases by the proper combination and configuration of detection schemes, and a new metric is proposed to measure the impact of Stealthy attacks.
ReportDOI
Survey and New Directions for Physics-Based Attack Detection in Control Systems
David I. Urbina,Jairo Giraldo,Alvaro A. Cardenas,Junia Valente,Mustafa Amir Faisal,Nils Ole Tippenhauer,Justin Ruths,Richard Candell,Henrik Sandberg +8 more
TL;DR: Monitoring the "physics" of control systems to detect attacks is a growing area of research and in its basic form a security monitor creates time-series models of sensor readings for an industrial con ...
Book ChapterDOI
SigPath: A Memory Graph Based Approach for Program Data Introspection and Modification
TL;DR: A novel memory graph based approach for program data introspection and modification, which takes as input a sequence of memory snapshots taken while the program executes, and produces a path signature, which can be used in different executions of the program to efficiently locate and traverse the in-memory data structures where the data of interest is stored.