Skip to main content

Showing 1–4 of 4 results for author: Maniatakos, M

Searching in archive eess. Search in all archives.
.
  1. arXiv:2212.04229  [pdf, other

    cs.CR eess.SY

    ICSPatch: Automated Vulnerability Localization and Non-Intrusive Hotpatching in Industrial Control Systems using Data Dependence Graphs

    Authors: Prashant Hari Narayan Rajput, Constantine Doumanidis, Michail Maniatakos

    Abstract: The paradigm shift of enabling extensive intercommunication between the Operational Technology (OT) and Information Technology (IT) devices allows vulnerabilities typical to the IT world to propagate to the OT side. Therefore, the security layer offered in the past by air gap** is removed, making security patching for OT devices a hard requirement. Conventional patching involves a device reboot… ▽ More

    Submitted 8 December, 2022; originally announced December 2022.

    Comments: To appear in the 32nd USENIX Security Symposium, August 2023, Anaheim, CA, USA [16 pages, 12 figures, 5 tables, code available at https://github.com/momalab/ICSPatch]

  2. arXiv:2202.10075  [pdf, other

    cs.LG cs.CR eess.SY

    ICSML: Industrial Control Systems ML Framework for native inference using IEC 61131-3 code

    Authors: Constantine Doumanidis, Prashant Hari Narayan Rajput, Michail Maniatakos

    Abstract: Industrial Control Systems (ICS) have played a catalytic role in enabling the 4th Industrial Revolution. ICS devices like Programmable Logic Controllers (PLCs), automate, monitor, and control critical processes in industrial, energy, and commercial environments. The convergence of traditional Operational Technology (OT) with Information Technology (IT) has opened a new and unique threat landscape.… ▽ More

    Submitted 21 April, 2023; v1 submitted 21 February, 2022; originally announced February 2022.

    Comments: 12 pages, 8 figures, code available at https://github.com/momalab/ICSML, to appear in CPSS 2023 workshop (ACM AsiaCCS'23)

  3. arXiv:2101.00008  [pdf, other

    cs.CR cs.CV cs.LG eess.IV

    Explainability Matters: Backdoor Attacks on Medical Imaging

    Authors: Munachiso Nwadike, Takumi Miyawaki, Esha Sarkar, Michail Maniatakos, Farah Shamout

    Abstract: Deep neural networks have been shown to be vulnerable to backdoor attacks, which could be easily introduced to the training set prior to model training. Recent work has focused on investigating backdoor attacks on natural images or toy datasets. Consequently, the exact impact of backdoors is not yet fully understood in complex real-world applications, such as in medical imaging where misdiagnosis… ▽ More

    Submitted 30 December, 2020; originally announced January 2021.

  4. arXiv:2003.07859  [pdf, other

    cs.CR cs.LG eess.SY physics.soc-ph stat.ML

    Stop-and-Go: Exploring Backdoor Attacks on Deep Reinforcement Learning-based Traffic Congestion Control Systems

    Authors: Yue Wang, Esha Sarkar, Wenqing Li, Michail Maniatakos, Saif Eddin Jabari

    Abstract: Recent work has shown that the introduction of autonomous vehicles (AVs) in traffic could help reduce traffic jams. Deep reinforcement learning methods demonstrate good performance in complex control problems, including autonomous vehicle control, and have been used in state-of-the-art AV controllers. However, deep neural networks (DNNs) render automated driving vulnerable to machine learning-base… ▽ More

    Submitted 26 August, 2021; v1 submitted 17 March, 2020; originally announced March 2020.

    Report number: 2021

    Journal ref: IEEE Transactions on Information Forensics and Security, 2021