scispace - formally typeset
S

Saurabh Amin

Researcher at Massachusetts Institute of Technology

Publications -  148
Citations -  6490

Saurabh Amin is an academic researcher from Massachusetts Institute of Technology. The author has contributed to research in topics: Computer science & Nash equilibrium. The author has an hindex of 28, co-authored 133 publications receiving 5605 citations. Previous affiliations of Saurabh Amin include University of California, Berkeley.

Papers
More filters
Proceedings ArticleDOI

Secure Control: Towards Survivable Cyber-Physical Systems

TL;DR: This position paper identifies and defines the problem of secure control, investigates the defenses that information security and control theory can provide, and proposes a set of challenges that need to be addressed to improve the survivability of cyber-physical systems.
Proceedings ArticleDOI

Attacks against process control systems: risk assessment, detection, and response

TL;DR: By incorporating knowledge of the physical system under control, this paper is able to detect computer attacks that change the behavior of the targeted control system and analyze the security and safety of the mechanisms by exploring the effects of stealthy attacks, and by ensuring that automatic attack-response mechanisms will not drive the system to an unsafe state.
Book ChapterDOI

Safe and Secure Networked Control Systems under Denial-of-Service Attacks

TL;DR: This work presents a semi-definite programming based solution for solving the problem of security constrained optimal control for discrete-time, linear dynamical systems in which control and measurement packets are transmitted over a communication network.
Proceedings Article

Research challenges for the security of control systems

TL;DR: This paper proposes a new mathematical framework to analyze attacks against control systems and formulates specific research problems to detect attacks, and survive attacks.
Proceedings ArticleDOI

Cyber security analysis of state estimators in electric power systems

TL;DR: It is shown that the more accurate model the attacker has access to, the larger deception attack he can perform undetected, and trade-offs between model accuracy and possible attack impact for different BDD schemes are quantified.