C.-Y. Lin and S. Nadjm-Tehrani, Understanding IEC-60870-5-104 Traffic Patterns in SCADA Networks, in CPSS’18: The 4th ACM Cyber-Physical System Security Workshop at AsiaCCS, ACM, 2018. Available as pdf.
M. Asplund, J. Lövhall, S. Nadjm-Tehrani, In-store Payments using Bitcoin, In Proceedings of International Workshop on Blockchains and Smart Contracts (BSC), IEEE, February 2018. Available as pdf.
A. Iqbal, M. Ekstedt, H. Alobaidli, Exploratory studies into forensic logs for criminal investigation using case studies in industrial control systems in the power sector in Proceedings of International Workshop on Big Data Analytic for Cyber Crime Investigation and Prevention, part of IEEE International Conference on Big Data (BigData’17), December 2017. DOI: 10.1109/BigData.2017.8258360
A. Karahasanovic, P. Kleberger, M. Almgren, Adapting Threat Modeling Methods for the Automotive Industry, Presented at the Embedded Security in Cars (ESCAR), November 2017. Available as pdf.
A. Lautenbach, M. Almgren, T. Olovsson, What the Stack? On Memory Exploitation and Protection in Resource Constrained Automotive Systems, in Proceedings of the 12th International Conference on Critical Information Infrastructure Security (CRITIS), Springer, October 2017. Available as pdf.
C.-Y. Lin, S. Nadjm-Tehrani, and M. Asplund, Timing-based Anomaly Detection in SCADA networks, in Proceedings of 12th International Conference on Critical Information Infrastructures Security (CRITIS), Springer, October 2017. Available as pdf.
A. Iqbal, M. Ekstedt, H. Alobaidli, Digital Forensic Readiness in Critical Infrastructures: A case of substation automation in the power sector. Book Chapter In: Digital Forensics and Cyber Crime (ICDF2C). Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, LNICST series Springer. October 2017. DOI: https://doi.org/10.1007/978-3-319-73697-6_9
D. Pereira, C. Hirata, R. Pagliares, and S. Nadjm-Tehrani, Towards Combined Safety and Security Constraints Analysis, in Proceedings of the 5th International Workshop on Assurance Cases for Software-Intensive Systems (ASSURE), SAFECOMP workshop, Lecture Notes in Computer Science Volume 10489, Springer, September 2017. DOI: 10.1007/978-3-319-66284-8_7
C. Stylianopoulos, M. Almgren, O. Landsiedel and M. Papatriantafilou, Multiple Pattern Matching for Network Security Applications: Acceleration through Vectorization, in Proceedings of the 46th International Conference on Parallel Processing (ICPP-2017), IEEE, August 2017. DOI: dx.doi.org/10.1109/ICPP.2017.56
M. Korman, M. Välja, G. Björkman, M. Ekstedt, A. Vernotte, R. Lagerström, Analyzing the Effectiveness of Attack Countermeasures in a SCADA System, In Proceedings of the 2nd Workshop on Cyber-Physical Security and Resilience in Smart Grids (CPS week), ACM, April 2017. DOI: 10.1145/3055386.3055393
P. Johnsson, D. Gorton, R.Lagerström, and M. Ekstedt, Time between Vulnerability Disclosures: A Measure of Software Product Vulnerability, Computers and Security, Volume 62, Elsevier, September 2016. dx.doi.org/10.1016/j.cose.2016.08.004
V. Botev, M. Almgren, V. Gulisano, O. Landsiedel, M, Papatrianfilou, J. van Rooij, Detecting non-technical losses through structural periodic patterns in AMI data, in Proceedings of International Conference on Bog Data (BigData), IEEE, December 2016. dx.doi.org/10.1109/BigData.2016.7840967
P. Johnsson, M. Ekstedt, R. Lagerström, Automatic Probablistic Enterprise IT Architecture Modelling: A Dynamic Bayesian Networks Approach, in Proceedings of the 20th International Enterprise Distributed Object Computing Conference Workshops, IEEE, September 2016. DOI: 10.1109/EDOCW.2016.7584351
P. Johnson, A. Vernotte, M. Ekstedt and R. Lagerström, pwnPr3d: an Attack Graph Driven Probabilistic Threat Modeling Approach, in Proceedings of the 11th International Conference on Availability, Reliability and Security (ARES), IEEE, September 2016. DOI: 10.1109/ARES.2016.77
G. Kalns, S. Nadjm-Tehrani, M. Vasilevskaya, Trading off Latency against Security in Open Energy Metering Infrastructures, in Proceedings of the 4th International Symposium for ICS and SCADA Cyber Security Research, August 2016. dx.doi.org/10.14236/ewic/ICS2016.17
V. Gulisano, V. Tudor, M. Almgren, and M. Papatriantafilou, BES – Differentially Private and Distributed Event Aggregation in Advanced Metering Infrastructures, in Proceedings of the 2nd ACM Cyber-Physical System Security Workshop (CPSS), ACM, 2016.
V. Tudor, M. Almgren, and M. Papatriantafilou, Employing Private Data in AMI Applications: Short Term Load Forecasting Using Differentially Private Aggregated Data, in Proceedings of the 13th IEEE International Conference on Advanced and Trusted Computing (ATC), IEEE, 2016. dx.doi.org/10.1109/UIC-ATC-ScalCom-CBDCom-IoP-SmartWorld.2016.0076
R. Udd, M. Asplund, S. Nadjm-Tehrani, M. Kazemtabrizi, and M. Ekstedt, Exploiting Bro for Intrusion Detection in a SCADA System, in Proceedings of the 2nd ACM Cyber-Physical System Security Workshop (CPSS), ACM, 2016. doi>10.1145/2899015.2899028, available as PDF.
O. Somarriba, U. Zurutuza, R. Uribeetxeberria, L. Delosiéres, and S. Nadjm-Tehrani, Detection and Visualization of Android Malware Behavior, Journal of Electrical and Computer Engineering, Hindawi, 2016. dx.doi.org/10.1155/2016/8034967
M. Vasilevskaya, Security in Embedded Systems: A Model-Based Approach with Risk Metrics, PhD Thesis, number 1715, Linköping University, December 2015.
M. Vasilevskaya and S. Nadjm-Tehrani, Quantifying Risks to Data Assets Using Formal Metrics in Embedded System Design, in International Conference on Computer Safety, Reliability and Security (SAFECOMP), Springer, September 2015. doi:10.1007/978-3-319-24255-2_25. Available as PDF.