E
Ezzeldin Shereen
Researcher at Royal Institute of Technology
Publications - 14
Citations - 105
Ezzeldin Shereen is an academic researcher from Royal Institute of Technology. The author has contributed to research in topics: Synchronization & Phasor. The author has an hindex of 5, co-authored 12 publications receiving 56 citations. Previous affiliations of Ezzeldin Shereen include German University in Cairo.
Papers
More filters
Journal ArticleDOI
Feasibility of Time-Synchronization Attacks Against PMU-Based State Estimation
Ezzeldin Shereen,Marguerite Delcourt,Sergio Barreto,Gyorgy Dan,Jean-Yves Le Boudec,Mario Paolone +5 more
TL;DR: This article shows how to perform undetectable attacks against more than two PMUs, and shows how an attacker can anticipate the operation of the clock servo while achieving her attack goal and remaining undetECTable.
Proceedings ArticleDOI
Next Steps in Security for Time Synchronization: Experiences from implementing IEEE 1588 v2.1
TL;DR: An overview of the planned security features of Precision Time Protocol version 2, and results based on an implementation of the proposed integrated security mechanism based on the open source Linux PTP, including support for hardware timestamping.
Journal ArticleDOI
Model-Based and Data-Driven Detectors for Time Synchronization Attacks Against PMUs
Ezzeldin Shereen,Gyorgy Dan +1 more
TL;DR: This paper develops a phasor measurement model and uses it to derive an accurate closed form expression for the correlation between the frequency adjustments made by the PMU clock and the resulting change in the measured phase angle, without an attack.
Proceedings ArticleDOI
A continuum of undetectable timing-attacks on PMU-based linear state-estimation
Sergio Barreto Andrade,Jean-Yves Le Boudec,Ezzeldin Shereen,Gyorgy Dan,Marco Pignati,Mario Paolone +5 more
TL;DR: This paper explores time synchronization attacks against PMU measurements that are undetectable by state-of-the-art Bad-Data Detection (BDD) algorithms, used for Linear State-Estimation (LSE).
Book ChapterDOI
Adversarial Attacks on Continuous Authentication Security: A Dynamic Game Approach
TL;DR: In this paper, the interaction between an attacker and an operator using continuous authentication is modeled as a stochastic game, and it is shown that the optimal attacker strategy consists of observing the user behavior to collect information at the beginning, and then attacking after gathering enough data.