Call: WASP Industrial PhD project grant, funded by the WASP
Awarded to: André Teixeira (PI-UU), together with Mina Alibeigi (PI-Zenseact)
USLC Members: TBA (PhD student at Zenseact)
This project introduces a Federated Reinforcement and Imitation Learning (FRL+FIL) framework for safe, scalable, and privacy-preserving training of planning policies in (semi-)autonomous fleets. The approach enables vehicles to collaboratively learn planning policies without sharing raw data, thus preserving privacy while exploiting the diversity of large fleets. Planning policies will be bootstrapped from expert demonstrations and refined locally through shielded reinforcement learning, with runtime safety mechanisms—such as coarse planners and learned safety filters—ensuring safe exploration. Model updates will be aggregated using robust federated techniques that tolerate faulty or malicious clients with low-quality driving behaviors and support personalization for region-specific adaptations. The framework will be validated on both simulated and real-world driving datasets, paving the way for the industrial deployment of next-generation AD/ADAS systems that are safer, more robust, and human-like in their driving behavior.
Call: EU MSCA Doctoral Network, funded by the European Commission
Awarded to: André Teixeira (PI-UU), together with PIs from 7 other EU universities
USLC Members: TBA
This DN intends to bridge the gap between theory and practice for secure and resilient cyber-physical systems by tackling the problem at its root. It brings together domain experts from control theory, computer science, and major industrial stakeholders to boost the security and resilience of control systems by outlining a sustainable program for training the next generation of innovators in this critical domain. It pursues a holistic approach that combines specialized training (in both academia and industry), while identifying challenging characteristics and security flaws in existing legacy systems, and pinpointing design requirements and solutions in future (networked) control systems.
Call: VR Project Grant in Information and Cyber Security, funded by the Swedish Research Council (Vetenskapsrådet)
Awarded to: André Teixeira (PI) and Per Mattsson
USLC Members: Ville Kjellqvist
Prob4Sec aims to develop theory and probabilistic methods for securing cyber-physical systems (CPSs) possessing learning and control capabilities: digital devices that learn from data they collect, and automatically decide how to best interact with the physical world over time. Intelligent CPSs are pervasive in our society. Users rely and trust that these devices will operate in a safe and secure manner. The consequences of incorrect behaviors in CPSs can be dire, threatening the users well being. Securing these systems is of utmost importance. Probabilistic methods are a natural way to deal with the uncertainty of physical systems and unintentional failures. Mathematical and statistical tools enable us to take a small number of samples and still be able to draw general conclusions. However, attacks are not only probabilistic but can have strategic behaviors, tailored to causing harm while avoiding detection. Hence, it is critical to develop systematic approaches that integrate the probabilistic and the strategic aspects of attacks in security analysis. Prob4Sec combines knowledge from security, statistical methods, and AI and control engineering to develop new methods for designing secure CPSs with learning and control functionalities. These methods will be instrumental in preventing future threats to all who benefit from this technology. Prob4Sec will provide further tools based on which trust in new technologies can be built and communicated, from developers to end users.
@article{Anand_Review2026,
author = {Anand, S. C. and Nguyen, A. T. and Teixeira, A. M. H. and Sandberg, H. and Johansson, K. H.},
journal = {Annual Reviews in Control (Submitted)},
title = {Quantifying Security for Networked Control Systems: A Review},
}@article{Dong_Automatica2026,
author = {Dong, J. and Teixeira, A. M. H.},
journal = {Automatica (submitted)},
title = {Stealthy bias injection attack detection based on Kullback-Leibler divergence in stochastic linear systems},
}@inproceedings{Kjellqvist_CDC2026,
author = {Kjellqvist$, V. and Mattsson, P. and Wigren, T. and Teixeira, A. M. H.},
title = {Constraint-Based Anomaly Detection for Estimation of ARX System Parameters},
booktitle = {IEEE Conf. Decision and Control (Submitted)},
year = {},
}@inproceedings{Seifullaev_ECC2026,
author = {Seifullaev, R. and Teixeira, A. M. H.},
title = {An H2-norm approach to performance analysis of networked control systems under multiplicative routing transformations},
booktitle = {European Control Conference (Accepted)},
year = {2026},
}@inproceedings{Eriksson_ECC026,
author = {Eriksson, L. and Wigren, T. and Zachariah, D. and Teixeira, A. M. H.},
title = {Detecting Feedback-path Delay Injection Attacks Using Interacting Multiple Model Filtering},
booktitle = {European Control Conference (Accepted)},
year = {2026},
}@inproceedings{Nguyen_CDC2025,
author = {Nguyen, A. T. and Zhu, Q. and Teixeira, A. M. H.},
title = {Bilateral Cognitive Security Games in Networked Control Systems under Stealthy Injection Attacks},
booktitle = {IEEE Conf. on Decision and Control (CDC)},
year = {2025},
}@inproceedings{Arnstrom_L4DC2025,
author = {Arnstr\"{o}m, D. and Teixeira, A. M. H.},
title = {Data-Driven and Stealthy Deactivation of Safety Filters},
booktitle = {Annual Learning for Dynamics & Control Conference (L4DC)},
year = {2025},
}@inproceedings{Anand_ECC2025,
author = {Anand, S. C. and Chong, M. S. and Teixeira, A. M. H.},
title = {Data-Driven Identification of Attack-free Sensors in Networked Control Systems},
booktitle = {European Control Conference},
year = {2025},
}@inproceedings{Arnstrom_ECC2024,
author = {Arnstr\"{o}m, D. and Teixeira, A. M. H.},
booktitle = {European Control Conference},
title = {Stealthy Deactivation of Safety Filters},
year = {2024},
}Call: VR Starting grant within natural and engineering sciences, funded by the Swedish Research Council (Vetenskapsrådet)
Awarded to: Per Mattsson (PI)
USLC Members: 1 PhD student
In real-world applications there are often many individual systems with similar dynamics - a population of systems. For example batteries in different cars, different batches in the process industry or different patients in medicine. By taking a population view we can study how the dynamical systems in the population can learn from each other, both when it comes to estimating models and designing controllers, and how to detect systems with anomalous behavior that may need maintenance or replacement. The aim of this project is to develop methods and analysis to tackle these problems in a coherent way. To realize this we have identified three subprojects. In the first we will develop and analyze estimation methods for populations of systems that can also handle anomalous systems. In the second we will study how these models can be used for population-wide monitoring and anomaly detection. In the third we will develop methods for robust data-driven control, where individual systems learn from each other. We already have established collaborations with experts in industry that can provide us with relevant applications and data for evaluation of the developed methods. By considering populations, instead of single systems as traditionally done in control theory, and taking on these three problems in a coherent way we believe that this project will open up new research directions in, and make significant contributions to, data-driven modeling, fault detection and control.
Call: VR Project grant within natural and engineering sciences, funded by the Swedish Research Council (Vetenskapsrådet)
Awarded to: Sérgio Pequito (PI)
USLC Members: Alessandro Varalda, André Teixeira
Neurological diseases and disorders significantly burden society, affecting millions of people and costing billions of euros annually. Digital pathology shows great potential in facilitating accurate diagnosis, prognosis, and treatment of these conditions, but models characterizing neural dynamics must be both explainable and efficient while capturing the long-term memory properties that play a crucial role in many neurological diseases and disorders. Fractional-order dynamical networks (FODNs) are a promising class of models, but the lack of necessary and sufficient conditions for learning them has hindered their adoption in practice. The SOCRATES project aims to develop necessary and sufficient conditions for efficient learning of FODNs and identify the minimum sensor and actuator placement for learning, observability, and controllability. The project will be carried out over four years and solved using concepts from dynamical and control systems theory, graph theory, and combinatorial optimization. The SOCRATES project aims to achieve the aforementioned goals, which will develop a new set of tools to improve our understanding of fractional-order dynamical networks, particularly neural dynamics. This enhanced understanding can lead to new therapies using neurostimulation devices for conditions such as epilepsy, chronic pain, and retinitis pigmentosa.
Call: Program ‘The Electrical System of the Future’, funded by the Swedish Energy Agency
Awarded to: Stefan Stanković (PI, RISE), Xiaofeng Xong (KTH), Henrik Sandberg (KTH), André Teixeira
USLC Members: Xinyu Wei
To meet the climate and safety challenges of today and the future, new technology is used that changes the dynamics of the electric power system, but which often also leads to unpredictable system behavior. To support voltage regulation in local distribution systems, but also to assist with voltage regulation in the overhead power transmission system, inverter-based generation is often used. However, these can lead to harmful interactions between voltage regulators that can compromise system security. This project analyzes these interactions. The project focus is on modeling and characterizing the interactions between voltage controllers, as well as developing methods for analyzing them. Based on the analysis, in the project we will propose solutions on how to implement new voltage regulation strategies in active distribution networks while avoiding risks of harmful interactions. The project thus contributes to improved resilience and future secure electricity supply.
Call: ‘Advanced and innovative digitalisation’, funded by the Sweden’s Innovation Agency (Vinnova)
Awarded to: Andreas Hellander (PI, Scaleout), Salman Toor (Scaleout), André Teixeira
USLC Members: Usama Zafar, Javad Parsa
The project´s primary aim is to increase our understanding of scalability and cyber security in federated machine learning specifically for cloud edge applications. We will also further develop and validate a system development kit for federated machine learning, FEDn, for large-scale applications in fleet intelligence.
@inproceedings{Parsa_ICLR2026,
author = {Parsa, J. and Daghestani, A. H. and Teixeira, A. M. H. and Johansson, M.},
title = {Byzantine-Robust Federated Learning with Learnable Aggregation Weights},
booktitle = {ICLR 2026 (Accepted)},
year = {2026},
}Call: ‘Joint Strategic Research Activities - Graduate School in Cybersecurity’, funded by the Dept. of Information Technology, Uppsala University
Awarded to: Salman Toor (PI), André Teixeira
USLC Members: Usama Zafar
The overall aims of the project are to mitigate the risk of attacks by providing security and enhanced privacy for a scalable federated training environment. In particular, the project addresses concerns related to security and privacy in federated machine learning against model poisoning and information leakage attacks. The envisioned approach is centered around developing new theories and methodologies to achieve two main aims: secure aggregation of local models under poisoning attacks, and private distributed aggregation of local models.
@article{Zafar_TDSC2025,
title = {Robust Federated Learning Against Poisoning Attacks: A GAN-Based Defense Framework},
journal = {(In preparation)},
author = {Zafar, Usama and Teixeira, André M. H. and Toor, Salman},
year = {},
}Call: ‘Graduate School in Data-Intensive Science’, funded by the eSSENCE-SciLifeLab
Awarded to: Salman Toor (PI), André Teixeira
USLC Members: Zhenlu Sun
In the last two decades, solutions to address software vulnerabilities have evolved significantly. With predictive schemes, vulnerability analysis has shifted from being reactive to being proactive in terms of early identification of possible risks. A comprehensive vulnerability analysis requires data from application execution patterns, network logs, infrastructure logs, and traces from the source code. Efficient collection, availability and analysis of the log files is a non-trivial task as this data grows rapidly with the execution pattern of the applications. The other sources include infrastructure settings and, most importantly, the information available in public vulnerability databases. All these massive data sources form the basis to call vulnerability analysis a big data challenge. A comprehensive data-driven vulnerability analysis framework will be required to ensure reliable, efficient and uninterrupted mission critical services based on software applications. This project takes a data-intensive approach to analyse and diagnose the presence of cybersecurity vulnerabilities in software applications supporting services within critical computing infrastructures. Our approach consists of combining above-mentioned different data sources with attack modeling frameworks and use explainable machine learning techniques to analyze and diagnose security vulnerabilities in software and network configurations.
@inproceedings{Sun_ARES2024,
author = {Sun, Z. and Teixeira, A. M. H. and Toor, S.},
booktitle = {The International Conference on Availability, Reliability and Security (ARES)},
title = {GNN-IDS: Graph Neural Network based Intrusion Detection System},
year = {2024},
doi = {10.1145/3664476.3664515},
}Call: VR Project Grant in Societal Security, funded by the Swedish Research Council (Vetenskapsrådet)
Awarded to: André Teixeira (PI), Alexander Medvedev, Per Mattsson, Stefan Engblom
Civil infrastructure networks (CIN) critically support modern society by distributing resources and protecting communities from hazards. Distributed control and monitoring of CIN to meet network demand under the network efficiency and cost constraints also poses physical security and cyber-security challenges. The resilience of civil infrastructure to disruptive events is the overarching topic of the present project. The project goal is to devise a coherent system theoretical platform for resilience analysis of CIN as well as resilience informed control of those. More specifically, a CIN is modeled as a cyber-physical system (CPS) whose physical layer is a transportation network equipped with actuator and sensor nodes interlaced with a computer network that implements control and monitoring of the physical layer. The scope is limited to the consideration of CPS with a tree-structured physical layer and covers a broad class of pipeline systems, i.e. networked systems transporting single or multi phase fluids. Failures, breakdowns, natural hazards, and cyberattacks are considered potential disruptive events. The project will be conducted along three main threads Mathematical modeling of CIM as CPS Model based assessment of resilience via operational indices Resilience informed control of CIM. The feasibility and efficacy of the developed mathematical models and algorithms will be evaluated with respect to urban water and wastewater networks.
@article{Anand_Review2026,
author = {Anand, S. C. and Nguyen, A. T. and Teixeira, A. M. H. and Sandberg, H. and Johansson, K. H.},
journal = {Annual Reviews in Control (Submitted)},
title = {Quantifying Security for Networked Control Systems: A Review},
}@article{Govaert_TCNS2026,
author = {Govaert, A. and Teixeira, A. M. H.},
journal = {IEEE Transaction on Control of Networked Systems (Submitted)},
title = {Linking global distances and local structures in networks},
}@article{Govaert_Arxiv2025,
author = {Govaert, A. and Teixeira, A. M. H. and Tegling, E.},
journal = {Under preparation},
title = {The diverse and fair structures of growth with scale-free saturations},
}@article{Gurpegui_LCSS2026,
author = {Gurpegui, A. and Anand, S. C. and Teixeira, A. M. H.},
journal = {IEEE Control Systems Letters (submitted)},
title = {Scalable Design of Attack-Resilient Controllers for Positive Systems},
}@article{Li_TAC2025,
author = {Li, Z. and Nguyen, A. T. and Teixeira, A. M. H. and Mo, Y. and Johansson, K. H.},
journal = {IEEE Trans. Automatic Control (Submitted)},
title = {Secure Filtering against Spatio-Temporal False Data Attacks under Asynchronous Sampling},
}@article{Dong_TCST2025,
author = {Dong, Jingwei and Sadabadi, Mahdieh S. and Mattsson, Per and Teixeira, Andr\'{e}},
journal = {IEEE Trans. Control System Technology (Submitted)},
volume = {},
number = {},
pages = {},
title = {Distributed Multiple Fault Detection and Estimation in DC Microgrids with Unknown Power Loads},
year = {},
}@article{Nguyen_TAC2026,
author = {Nguyen, A. T. and Anand, S. C. and Teixeira, A. M. H.},
journal = {IEEE Trans. Automatic Control (Accepted)},
title = {Scalable and Optimal Security Allocation in Networks against Stealthy Injection Attacks},
year = {2026},
doi = {10.1109/TAC.2025.3639126},
}@inproceedings{Nguyen_CDC2025,
author = {Nguyen, A. T. and Zhu, Q. and Teixeira, A. M. H.},
title = {Bilateral Cognitive Security Games in Networked Control Systems under Stealthy Injection Attacks},
booktitle = {IEEE Conf. on Decision and Control (CDC)},
year = {2025},
}@inproceedings{Nguyen_NecSys2025,
author = {Nguyen, A. T. and Anand, S. C. and Teixeira, A. M. H.},
title = {Security Metrics for Uncertain Interconnected Systems under Stealthy Data Injection Attacks},
booktitle = {10th IFAC Conference on Networked Systems (NecSys)},
year = {2025},
}@article{Nguyen_TCNS2024,
author = {Nguyen, A. T. and Teixeira, A. M. H. and Medvedev, A.},
journal = {IEEE Trans. Control of Network Systems},
title = {Security Allocation in Networked Control Systems under Stealthy Attacks},
volume = {12},
number = {1},
pages = {216-227},
doi = {10.1109/TCNS.2024.3462546},
month = mar,
year = {2025},
}@inproceedings{Nguyen_CRITIS24,
author = {Nguyen, A. T. and Hertzberg, A. and Teixeira, A. M. H.},
title = {Centrality-based Security Allocation in Networked Control Systems},
year = {2025},
editor = {Oliva, Gabriele and Panzieri, Stefano and H{\"a}mmerli, Bernhard and Pascucci, Federica and Faramondi, Luca},
booktitle = {Critical Information Infrastructures Security},
publisher = {Springer Nature Switzerland},
address = {Cham},
pages = {212--230},
note = {Presented at the 19th International Conference on Critical Information Infrastructures Security},
doi = {10.1007/978-3-031-84260-3_13},
}@phdthesis{Nguyen_Lic2023,
author = {Nguyen, Anh Tung},
title = {Security Allocation in Networked Control Systems},
school = {Uppsala University},
year = {2023},
address = {Uppsala, Sweden},
month = oct,
type = {Licentiate thesis},
}@inproceedings{NguyenIFAC2023,
address = {},
author = {Nguyen, A. T. and Anand, S. C. and Teixeira, A. M. H. and Medvedev, A.},
booktitle = {IFAC World Congress},
title = {Optimal Detector Placement in Networked Control Systems under Cyber-attacks with Applications to Power Networks},
year = {2023},
}@inproceedings{NguyenNecsys2022,
address = {},
author = {Nguyen, A. T. and Teixeira, A. M. H. and Medvedev, A.},
booktitle = {IFAC Conference on Networked Systems (NecSys)},
title = {A Single-Adversary-Single-Detector Zero-Sum Game in Networked Control Systems},
year = {2022},
doi = {10.1016/j.ifacol.2022.07.234},
}Call: SSF Future Research Leaders 7, funded by the Swedish Foundation for Strategic Research (SSF)
Awarded to: André Teixeira (PI)
Reports of cyber-attacks on digitally controlled systems supporting modern societies, such as Stuxnet, have shown their devastating consequences to safety and human lives, and shed light on the attackers modus operandi first learn the system, then tamper the visible information so the attack is undetected, and meanwhile have significant impact on the physical system. It is of the utmost importance to be able to detect and mitigate such malicious cyber-attacks. Unfortunately, existing methods in control engineering consider impact on the physical system and detectability separately, and thus fail to accurately tackle cyber attacks that strategically mix high impact with low detectability. On the other hand, approaches from secure control assume adversaries with perfect knowledge, resulting in overly pessimistic, unrealistic conclusions. The project will produce approaches to analyze and mitigate cyber-attacks on control systems, through the following actions 1) to construct novel sensitivity metrics that jointly consider the impact and detectability of attacks under uncertainty; 2) to design optimal anomaly detectors, controllers, and security measure deployment that minimize the novel sensitivity metrics, and thus increase security; 3) to experimentally validate the developed scientific approaches in testbeds and numerical benchmarks. The developed science and tools will induce a paradigm change in robust control and fault detection, and allow for more effective handling of anomalies.
@article{Anand_Review2026,
author = {Anand, S. C. and Nguyen, A. T. and Teixeira, A. M. H. and Sandberg, H. and Johansson, K. H.},
journal = {Annual Reviews in Control (Submitted)},
title = {Quantifying Security for Networked Control Systems: A Review},
}@article{Dong_Automatica2026,
author = {Dong, J. and Teixeira, A. M. H.},
journal = {Automatica (submitted)},
title = {Stealthy bias injection attack detection based on Kullback-Leibler divergence in stochastic linear systems},
}@article{Gurpegui_LCSS2026,
author = {Gurpegui, A. and Anand, S. C. and Teixeira, A. M. H.},
journal = {IEEE Control Systems Letters (submitted)},
title = {Scalable Design of Attack-Resilient Controllers for Positive Systems},
}@inproceedings{Seifullaev_IFACWC2026,
author = {Seifullaev, R. and Teixeira, A. M. H.},
title = {Impact analysis of hidden faults in nonlinear control systems using output-to-output gain},
booktitle = {IFAC World Congress (Submitted)},
year = {},
}@article{Gallo_TAC2025,
author = {Gallo, A. and Nguyen, A. T. and Oliva, G. and Teixeira, A. M. H.},
journal = {IEEE Trans. Automatic Control (Submitted)},
number = {},
pages = {},
title = {On the Boundedness of the Solution to the Output-to-output l2-gain Strategic Stealthy Attacks Problem},
volume = {},
year = {},
}@article{Li_TAC2025,
author = {Li, Z. and Nguyen, A. T. and Teixeira, A. M. H. and Mo, Y. and Johansson, K. H.},
journal = {IEEE Trans. Automatic Control (Submitted)},
title = {Secure Filtering against Spatio-Temporal False Data Attacks under Asynchronous Sampling},
}@article{Arnstrom_SCL2025,
author = {Arnstr\"{o}m, D. and Teixeira, A. M. H.},
journal = {System \& Control Letters},
volume = {213},
number = {},
pages = {106430},
title = {Efficiently Computing the Cyclic Output-to-Output Gain},
year = {2026},
doi = {10.1016/j.sysconle.2026.106430},
}@inproceedings{Seifullaev_ECC2026,
author = {Seifullaev, R. and Teixeira, A. M. H.},
title = {An H2-norm approach to performance analysis of networked control systems under multiplicative routing transformations},
booktitle = {European Control Conference (Accepted)},
year = {2026},
}@inproceedings{Eriksson_ECC026,
author = {Eriksson, L. and Wigren, T. and Zachariah, D. and Teixeira, A. M. H.},
title = {Detecting Feedback-path Delay Injection Attacks Using Interacting Multiple Model Filtering},
booktitle = {European Control Conference (Accepted)},
year = {2026},
}@inproceedings{Dong_ACC2026,
author = {Dong, J. and Zhang, K. and Nguyen, A. T. and Teixeira, A. M. H.},
title = {Fundamental limitations of sensitivity metrics for anomaly impact analysis in LTI systems},
booktitle = {American Control Conference (Accepted)},
year = {2026},
}@article{Nguyen_TAC2026,
author = {Nguyen, A. T. and Anand, S. C. and Teixeira, A. M. H.},
journal = {IEEE Trans. Automatic Control (Accepted)},
title = {Scalable and Optimal Security Allocation in Networks against Stealthy Injection Attacks},
year = {2026},
doi = {10.1109/TAC.2025.3639126},
}@inproceedings{Zhang_CDC2025,
author = {Zhang, Kangkang and Kasis, Andreas and Teixeira, A. M. H. and Jiang, Bin},
title = {Vulnerability Analysis against Stealthy Integrity Attacks for Nonlinear Systems},
booktitle = {IEEE Conf. on Decision and Control (CDC)},
year = {2025},
}@inproceedings{Nguyen_CDC2025,
author = {Nguyen, A. T. and Zhu, Q. and Teixeira, A. M. H.},
title = {Bilateral Cognitive Security Games in Networked Control Systems under Stealthy Injection Attacks},
booktitle = {IEEE Conf. on Decision and Control (CDC)},
year = {2025},
}@article{Tosun_EJC2025,
author = {Tosun, F. E. and Teixeira, A. M. H. and Dong, J. and Ahlén, A. and Dey, S.},
journal = {European Journal of Control},
volume = {},
number = {},
pages = {101427},
title = {Kullback-Leibler Divergence-Based Filter Design Against Bias Injection Attacks},
year = {2025},
doi = {10.1016/j.ejcon.2025.101427},
}@inproceedings{Nguyen_NecSys2025,
author = {Nguyen, A. T. and Anand, S. C. and Teixeira, A. M. H.},
title = {Security Metrics for Uncertain Interconnected Systems under Stealthy Data Injection Attacks},
booktitle = {10th IFAC Conference on Networked Systems (NecSys)},
year = {2025},
}@inproceedings{Arnstrom_L4DC2025,
author = {Arnstr\"{o}m, D. and Teixeira, A. M. H.},
title = {Data-Driven and Stealthy Deactivation of Safety Filters},
booktitle = {Annual Learning for Dynamics & Control Conference (L4DC)},
year = {2025},
}@inproceedings{Anand_ECC2025,
author = {Anand, S. C. and Chong, M. S. and Teixeira, A. M. H.},
title = {Data-Driven Identification of Attack-free Sensors in Networked Control Systems},
booktitle = {European Control Conference},
year = {2025},
}@article{Gallo_Automatica2025,
author = {Gallo, A. J. and Anand, S. C. and Teixeira, A. M. H. and Ferrari, R. M.G.},
journal = {Automatica},
title = {Switching Multiplicative Watermark design against Covert Attacks},
volume = {177},
pages = {112301},
year = {2025},
doi = {10.1016/j.automatica.2025.112301},
}@article{Tosun_TIFS2025,
author = {Tosun, F. E. and Teixeira, A. M. H. and Dong, J. and Ahlén, A. and Dey, S.},
journal = {IEEE Trans. Information Forensics and Security},
volume = {20},
number = {},
pages = {2763-2777},
title = {Kullback-Leibler Divergence-Based Observer Design Against Sensor Bias Injection Attacks in Single-Output Systems},
year = {2025},
doi = {10.1109/TIFS.2025.3546167},
}@article{Nguyen_TCNS2024,
author = {Nguyen, A. T. and Teixeira, A. M. H. and Medvedev, A.},
journal = {IEEE Trans. Control of Network Systems},
title = {Security Allocation in Networked Control Systems under Stealthy Attacks},
volume = {12},
number = {1},
pages = {216-227},
doi = {10.1109/TCNS.2024.3462546},
month = mar,
year = {2025},
}@inproceedings{Nguyen_CRITIS24,
author = {Nguyen, A. T. and Hertzberg, A. and Teixeira, A. M. H.},
title = {Centrality-based Security Allocation in Networked Control Systems},
year = {2025},
editor = {Oliva, Gabriele and Panzieri, Stefano and H{\"a}mmerli, Bernhard and Pascucci, Federica and Faramondi, Luca},
booktitle = {Critical Information Infrastructures Security},
publisher = {Springer Nature Switzerland},
address = {Cham},
pages = {212--230},
note = {Presented at the 19th International Conference on Critical Information Infrastructures Security},
doi = {10.1007/978-3-031-84260-3_13},
}@inproceedings{Anand_CDC024,
author = {Anand, S. C. and Grussler, C. and Teixeira, A. M. H.},
title = {Scalable metrics to quantify security of large-scale systems},
year = {2024},
booktitle = {IEEE Conference on Decisions and Control},
doi = {10.1109/CDC56724.2024.10886808},
}@inproceedings{Seifullaev_CDC024,
author = {Seifullaev, R. and Teixeira, A. M. H. and Ahl\'{e}n, A.},
booktitle = {IEEE Conference on Decisions and Control},
title = {Event-triggered control of nonlinear systems under deception and Denial-of-Service attacks},
year = {2024},
doi = {10.1109/CDC56724.2024.10886155},
}@inproceedings{Arnstrom_ECC2024,
author = {Arnstr\"{o}m, D. and Teixeira, A. M. H.},
booktitle = {European Control Conference},
title = {Stealthy Deactivation of Safety Filters},
year = {2024},
}@inproceedings{Wigren_ECC2024,
author = {Wigren, T. and Teixeira, A. M. H.},
booktitle = {European Control Conference},
title = {Delay Attack and Detection in Feedback Linearized Control Systems},
year = {2024},
}@inproceedings{Wigren_ECC2025,
author = {Wigren, T.},
booktitle = {European Control Conference},
title = {Convergence in delayed recursive identification of nonlinear systems},
year = {2024},
}@inproceedings{Tosun_SAFEPROCESS2024,
author = {Tosun, F. E. and Teixeira, A. M. H. and Ahlén, A. and Dey, S.},
booktitle = {12th IFAC Symposium on Fault Detection, Supervision and Safety for Technical Processes},
title = {Kullback-Leibler Divergence-Based Detector Design Against Bias Injection Attacks in an Artificial Pancreas System},
year = {2024},
doi = {10.1016/j.ifacol.2024.07.269},
}@article{Tosun_JPC2024,
author = {Tosun, F. E. and Teixeira, A. M. H. and Abdalmoaty, M. and Ahl\'{e}n, A. and Dey, S.},
journal = {Journal of Process Control},
volume = {153},
number = {103162},
title = {Quickest Detection of Bias Injection Attacks on the Glucose Sensor in the Artificial Pancreas Under Meal Disturbances},
year = {2024},
doi = {10.1016/j.jprocont.2024.103162},
}@phdthesis{Nguyen_Lic2023,
author = {Nguyen, Anh Tung},
title = {Security Allocation in Networked Control Systems},
school = {Uppsala University},
year = {2023},
address = {Uppsala, Sweden},
month = oct,
type = {Licentiate thesis},
}@article{Anand_TAC2024,
author = {Anand, S. C. and Teixeira, A. M. H. and Ahl\'{e}n, A.},
journal = {IEEE Trans. Automatic Control},
number = {5},
pages = {3214--3221},
title = {Risk Assessment of Stealthy Attacks on Uncertain Control Systems},
volume = {69},
month = may,
year = {2024},
doi = {10.1109/TAC.2023.3318194},
}@article{Anand_IEEEOJCSys2023,
author = {Anand, S. C. and Teixeira, A. M. H.},
journal = {IEEE Open Journal of Control Systems},
number = {},
pages = {297--309},
title = {Risk-based Security Measure Allocation Against Actuator Attacks},
volume = {2},
year = {2023},
doi = {10.1109/OJCSYS.2023.3305831},
}@inproceedings{Ramos_CDC2023,
author = {Ramos, G. and Teixeira, A. M. H. and Pequito, S.},
booktitle = {IEEE Conference on Decisions and Control},
title = {On the trade-offs between accuracy, privacy, and resilience in average consensus algorithms},
year = {2023},
}@inproceedings{Tosun_CDC2023,
address = {},
author = {Tosun, F. E. and Teixeira, A. M. H.},
booktitle = {IEEE Conference on Decisions and Control},
title = {Robust Sequential Detection of Non-stealthy Sensor Deception Attacks in an Artificial Pancreas System},
year = {2023},
}@inproceedings{Li_CDC2023,
address = {},
author = {Li, Z. and Nguyen, A. T. and Teixeira, A. M. H. and Mo, Y. and Johansson, K. H.},
booktitle = {IEEE Conference on Decisions and Control},
title = {Secure State Estimation with Asynchronous Measurements against Malicious Measurement-data and Time-stamp Manipulation},
year = {2023},
}@inproceedings{Wigren_CDC2023,
address = {},
author = {Wigren, T. and Teixeira, A. M. H.},
booktitle = {IEEE Conference on Decisions and Control},
title = {Feedback Path Delay Attacks and Detection},
year = {2023},
}@article{Naha_AUTOMATICA2023,
author = {Naha, A. and Teixeira, A. M. H. and Ahl\'{e}n, A. and Dey, S.},
journal = {Automatica},
number = {},
pages = {111147},
title = {Quickest Detection of Deception Attacks on Cyber-Physical Systems with a Parsimonious Watermarking Policy},
volume = {155},
year = {2023},
doi = {10.1016/j.automatica.2023.111147},
}@article{Naha_EJC2023,
author = {Naha, A. and Teixeira, A. M. H. and Ahl\'{e}n, A. and Dey, S.},
journal = {European Journal of Control},
number = {},
pages = {100804},
title = {Quickest Physical Watermarking-Based Detection of Measurement Replacement Attacks in Networked Control Systems},
volume = {71},
year = {2023},
doi = {10.1016/j.ejcon.2023.100804},
}@inproceedings{AbdalmoatyIFAC2023,
address = {},
author = {Abdalmoaty, M. and Anand, S. C. and Teixeira, A. M. H.},
booktitle = {IFAC World Congress},
title = {Privacy and Security in Network Controlled Systems via Dynamic Masking},
year = {2023},
video = {https://youtu.be/uuz5ppriWLk},
}@inproceedings{NguyenIFAC2023,
address = {},
author = {Nguyen, A. T. and Anand, S. C. and Teixeira, A. M. H. and Medvedev, A.},
booktitle = {IFAC World Congress},
title = {Optimal Detector Placement in Networked Control Systems under Cyber-attacks with Applications to Power Networks},
year = {2023},
}@inproceedings{WigrenIFAC2023,
address = {},
author = {Wigren, T. and Teixeira, A. M. H.},
booktitle = {IFAC World Congress},
title = {On-line Identification of Delay Attacks in Networked Servo Control},
year = {2023},
}@article{Zhang_TAC2023,
author = {Zhang, Q. and Liu, K. and Teixeira, A. M. H. and Li, Y. and Chai, S. and Xia, Y.},
journal = {IEEE Trans. Automatic Control},
number = {6},
pages = {3672--3679},
title = {An Online Kullback-Leibler Divergence-Based Stealthy Attack against Cyber-Physical Systems},
volume = {68},
year = {2023},
doi = {10.1109/TAC.2022.3192201},
}@article{NahaTAC2022,
author = {Naha, A. and Teixeira, A. M. H. and Ahl\'{e}n, A. and Dey, S.},
journal = {IEEE Trans. Automatic Control},
number = {3},
pages = {1941--1948},
title = {Sequential detection of Replay attacks},
volume = {68},
year = {2023},
doi = {10.1109/TAC.2022.3174004},
}@inproceedings{NguyenCDC2022,
address = {},
author = {Nguyen, A. T. and Anand, S. C. and Teixeira, A. M. H.},
booktitle = {IEEE Conference on Decision and Control (CDC)},
title = {A Zero-Sum Game Framework for Optimal Sensor Placement in Uncertain Networked Control Systems under Cyber-Attacks},
year = {2022},
doi = {10.1109/CDC51059.2022.9992468},
}@inproceedings{NahaCDC2022,
address = {},
author = {Naha, A. and Teixeira, A. M. H. and Ahl\'{e}n, A. and Dey, S.},
booktitle = {IEEE Conference on Decisions and Control (CDC)},
title = {Structural analyses of a parsimonious watermarking policy
for data deception attack detection in networked control systems},
year = {2022},
doi = {10.1109/CDC51059.2022.9993201},
}@inproceedings{AnandCCTA2022,
address = {},
author = {Anand, S. C. and Teixeira, A. M. H. and Ahl\'{e}n, A.},
booktitle = {IEEE Conference on Control Technology and Applications (CCTA)},
title = {Risk assessment and optimal allocation of security measures under stealthy false data injection attacks},
year = {2022},
doi = {10.1109/CCTA49430.2022.9966025},
}@inproceedings{NguyenNecsys2022,
address = {},
author = {Nguyen, A. T. and Teixeira, A. M. H. and Medvedev, A.},
booktitle = {IFAC Conference on Networked Systems (NecSys)},
title = {A Single-Adversary-Single-Detector Zero-Sum Game in Networked Control Systems},
year = {2022},
doi = {10.1016/j.ifacol.2022.07.234},
}@inproceedings{Tosun_ACC2022,
address = {Atlanta, Georgia, USA},
author = {Tosun, F. E. and Teixeira, A. M. H. and Ahl\'{e}n, A. and Dey, S.},
booktitle = {American Control Conference},
title = {Detection of Bias Injection Attacks on the Glucose Sensor in the Artificial Pancreas Under Meal Disturbances},
year = {2022},
doi = {10.23919/ACC53348.2022.9867556},
}@inproceedings{Naha_ACC2022,
address = {Atlanta, Georgia, USA},
author = {Naha, A. and Teixeira, A. M. H. and Ahl\'{e}n, A. and Dey, S.},
booktitle = {American Control Conference},
title = {Sequential Detection of Replay Attacks with a Parsimonious Watermarking Policy},
year = {2022},
doi = {10.23919/ACC53348.2022.9867703},
}@inproceedings{Anand_ACC2022,
address = {Atlanta, Georgia, USA},
author = {Anand, S. C. and Teixeira, A. M. H.},
booktitle = {American Control Conference},
title = {Risk-averse controller design against data injection attacks on actuators for uncertain control systems},
year = {2022},
doi = {10.23919/ACC53348.2022.9867257},
}@inproceedings{Gallo_CDC2021,
address = {Austin, Texas, USA},
author = {Gallo, A. J. and Anand, S. C. and Teixeira, A. M. H. and Ferrari, R. M. G.},
booktitle = {IEEE Conf. Decision and Control},
title = {Design of multiplicative watermarking against covert attacks},
year = {2021},
doi = {10.1109/CDC45484.2021.9683075},
}@inproceedings{Anand_CDC2021,
address = {Austin, Texas, USA},
author = {Anand, S. C. and Teixeira, A. M. H.},
booktitle = {IEEE Conf. Decision and Control},
title = {Stealthy Cyber-Attack Design Using Dynamic Programming},
year = {2021},
doi = {10.1109/CDC45484.2021.9683451},
}@inproceedings{Naha_ECC2021,
address = {Rotterdam, The Netherlands},
author = {Naha, A. and Teixeira, A. M. H. and Ahl\'{e}n, A. and Dey, S.},
booktitle = {Eur. Control Conf.},
title = {Deception Attack Detection Using Reduced Watermarking},
year = {2021},
doi = {10.23919/ECC54610.2021.9654843},
}@incollection{FerrariTeixeira_Springer2021,
author = {Ferrari, Riccardo M. G. and Teixeira, Andr{\'e} M. H.},
editor = {Ferrari, Riccardo M.G. and Teixeira, Andr{\'e} M. H.},
title = {Introduction to the Book},
booktitle = {Safety, Security and Privacy for Cyber-Physical Systems},
year = {2021},
publisher = {Springer International Publishing},
address = {Cham},
pages = {1--8},
isbn = {978-3-030-65048-3},
doi = {10.1007/978-3-030-65048-3_1},
}@incollection{Teixeira_Springer2021,
author = {Teixeira, Andr{\'e} M. H.},
editor = {Ferrari, Riccardo M.G. and Teixeira, Andr{\'e} M. H.},
title = {Security Metrics for Control Systems},
booktitle = {Safety, Security and Privacy for Cyber-Physical Systems},
year = {2021},
publisher = {Springer International Publishing},
address = {Cham},
pages = {1--8},
isbn = {978-3-030-65048-3},
doi = {10.1007/978-3-030-65048-3_6},
}@incollection{Ferrari_Springer2021,
author = {Ferrari, Riccardo M. G. and Teixeira, Andr{\'e} M. H.},
editor = {Ferrari, Riccardo M.G. and Teixeira, Andr{\'e} M. H.},
title = {Detection of Cyber-Attacks: A Multiplicative Watermarking Scheme},
booktitle = {Safety, Security and Privacy for Cyber-Physical Systems},
year = {2021},
publisher = {Springer International Publishing},
address = {Cham},
pages = {1--8},
isbn = {978-3-030-65048-3},
doi = {10.1007/978-3-030-65048-3_9},
}@article{Rostampour_TAC2020,
author = {Rostampour, V. and Ferrari, R. M.G. and Teixeira, A. M. H. and Keviczky, T.},
journal = {IEEE Trans. Automatic Control},
number = {11},
pages = {5299--5313},
title = {Privatized Distributed Anomaly Detection for Large-Scale Nonlinear Uncertain Systems},
volume = {66},
year = {2021},
doi = {10.1109/TAC.2020.3040251},
}@article{Ferrari_TAC2020,
author = {Ferrari, R. and Teixeira, A. M. H.},
journal = {IEEE Trans. Automatic Control},
number = {6},
pages = {2558--2573},
title = {A Switching Multiplicative Watermarking Scheme for Detection of Stealthy Cyber-Attacks},
volume = {66},
year = {2020},
}Call: VR Starting Grant, funded by the Swedish Research Council (Vetenskapsrådet)
Awarded to: André Teixeira (PI)
Reports on cyber-attacks, such as Stuxnet, have shown their devastating consequences on digitally controlled systems supporting modern societies. It is therefore of the utmost importance for control systems to be able to early detect and mitigate malicious cyber-attacks, which aim at having a significant impact on the system while remaining undetected. Unfortunately, existing techniques in control theory consider impact and detectability separately, and thus fail to accurately tackle malicious cyber-attacks. The aim of this project is to develop novel security metrics that jointly consider the impact and detectability of attacks, and that support the analysis and design of anomaly detectors and controllers for improved security and resilience.
@article{Anand_TAC2024,
author = {Anand, S. C. and Teixeira, A. M. H. and Ahl\'{e}n, A.},
journal = {IEEE Trans. Automatic Control},
number = {5},
pages = {3214--3221},
title = {Risk Assessment of Stealthy Attacks on Uncertain Control Systems},
volume = {69},
month = may,
year = {2024},
doi = {10.1109/TAC.2023.3318194},
}@article{Anand_IEEEOJCSys2023,
author = {Anand, S. C. and Teixeira, A. M. H.},
journal = {IEEE Open Journal of Control Systems},
number = {},
pages = {297--309},
title = {Risk-based Security Measure Allocation Against Actuator Attacks},
volume = {2},
year = {2023},
doi = {10.1109/OJCSYS.2023.3305831},
}@inproceedings{Wigren_CDC2023,
address = {},
author = {Wigren, T. and Teixeira, A. M. H.},
booktitle = {IEEE Conference on Decisions and Control},
title = {Feedback Path Delay Attacks and Detection},
year = {2023},
}@article{Naha_AUTOMATICA2023,
author = {Naha, A. and Teixeira, A. M. H. and Ahl\'{e}n, A. and Dey, S.},
journal = {Automatica},
number = {},
pages = {111147},
title = {Quickest Detection of Deception Attacks on Cyber-Physical Systems with a Parsimonious Watermarking Policy},
volume = {155},
year = {2023},
doi = {10.1016/j.automatica.2023.111147},
}@article{Naha_EJC2023,
author = {Naha, A. and Teixeira, A. M. H. and Ahl\'{e}n, A. and Dey, S.},
journal = {European Journal of Control},
number = {},
pages = {100804},
title = {Quickest Physical Watermarking-Based Detection of Measurement Replacement Attacks in Networked Control Systems},
volume = {71},
year = {2023},
doi = {10.1016/j.ejcon.2023.100804},
}@inproceedings{AbdalmoatyIFAC2023,
address = {},
author = {Abdalmoaty, M. and Anand, S. C. and Teixeira, A. M. H.},
booktitle = {IFAC World Congress},
title = {Privacy and Security in Network Controlled Systems via Dynamic Masking},
year = {2023},
video = {https://youtu.be/uuz5ppriWLk},
}@inproceedings{WigrenIFAC2023,
address = {},
author = {Wigren, T. and Teixeira, A. M. H.},
booktitle = {IFAC World Congress},
title = {On-line Identification of Delay Attacks in Networked Servo Control},
year = {2023},
}@article{Zhang_TAC2023,
author = {Zhang, Q. and Liu, K. and Teixeira, A. M. H. and Li, Y. and Chai, S. and Xia, Y.},
journal = {IEEE Trans. Automatic Control},
number = {6},
pages = {3672--3679},
title = {An Online Kullback-Leibler Divergence-Based Stealthy Attack against Cyber-Physical Systems},
volume = {68},
year = {2023},
doi = {10.1109/TAC.2022.3192201},
}@article{NahaTAC2022,
author = {Naha, A. and Teixeira, A. M. H. and Ahl\'{e}n, A. and Dey, S.},
journal = {IEEE Trans. Automatic Control},
number = {3},
pages = {1941--1948},
title = {Sequential detection of Replay attacks},
volume = {68},
year = {2023},
doi = {10.1109/TAC.2022.3174004},
}@inproceedings{NahaCDC2022,
address = {},
author = {Naha, A. and Teixeira, A. M. H. and Ahl\'{e}n, A. and Dey, S.},
booktitle = {IEEE Conference on Decisions and Control (CDC)},
title = {Structural analyses of a parsimonious watermarking policy
for data deception attack detection in networked control systems},
year = {2022},
doi = {10.1109/CDC51059.2022.9993201},
}@inproceedings{AnandCCTA2022,
address = {},
author = {Anand, S. C. and Teixeira, A. M. H. and Ahl\'{e}n, A.},
booktitle = {IEEE Conference on Control Technology and Applications (CCTA)},
title = {Risk assessment and optimal allocation of security measures under stealthy false data injection attacks},
year = {2022},
doi = {10.1109/CCTA49430.2022.9966025},
}@inproceedings{NguyenNecsys2022,
address = {},
author = {Nguyen, A. T. and Teixeira, A. M. H. and Medvedev, A.},
booktitle = {IFAC Conference on Networked Systems (NecSys)},
title = {A Single-Adversary-Single-Detector Zero-Sum Game in Networked Control Systems},
year = {2022},
doi = {10.1016/j.ifacol.2022.07.234},
}@inproceedings{Tosun_ACC2022,
address = {Atlanta, Georgia, USA},
author = {Tosun, F. E. and Teixeira, A. M. H. and Ahl\'{e}n, A. and Dey, S.},
booktitle = {American Control Conference},
title = {Detection of Bias Injection Attacks on the Glucose Sensor in the Artificial Pancreas Under Meal Disturbances},
year = {2022},
doi = {10.23919/ACC53348.2022.9867556},
}@inproceedings{Naha_ACC2022,
address = {Atlanta, Georgia, USA},
author = {Naha, A. and Teixeira, A. M. H. and Ahl\'{e}n, A. and Dey, S.},
booktitle = {American Control Conference},
title = {Sequential Detection of Replay Attacks with a Parsimonious Watermarking Policy},
year = {2022},
doi = {10.23919/ACC53348.2022.9867703},
}@inproceedings{Anand_ACC2022,
address = {Atlanta, Georgia, USA},
author = {Anand, S. C. and Teixeira, A. M. H.},
booktitle = {American Control Conference},
title = {Risk-averse controller design against data injection attacks on actuators for uncertain control systems},
year = {2022},
doi = {10.23919/ACC53348.2022.9867257},
}@inproceedings{Gallo_CDC2021,
address = {Austin, Texas, USA},
author = {Gallo, A. J. and Anand, S. C. and Teixeira, A. M. H. and Ferrari, R. M. G.},
booktitle = {IEEE Conf. Decision and Control},
title = {Design of multiplicative watermarking against covert attacks},
year = {2021},
doi = {10.1109/CDC45484.2021.9683075},
}@inproceedings{Anand_CDC2021,
address = {Austin, Texas, USA},
author = {Anand, S. C. and Teixeira, A. M. H.},
booktitle = {IEEE Conf. Decision and Control},
title = {Stealthy Cyber-Attack Design Using Dynamic Programming},
year = {2021},
doi = {10.1109/CDC45484.2021.9683451},
}@inproceedings{Naha_ECC2021,
address = {Rotterdam, The Netherlands},
author = {Naha, A. and Teixeira, A. M. H. and Ahl\'{e}n, A. and Dey, S.},
booktitle = {Eur. Control Conf.},
title = {Deception Attack Detection Using Reduced Watermarking},
year = {2021},
doi = {10.23919/ECC54610.2021.9654843},
}@incollection{FerrariTeixeira_Springer2021,
author = {Ferrari, Riccardo M. G. and Teixeira, Andr{\'e} M. H.},
editor = {Ferrari, Riccardo M.G. and Teixeira, Andr{\'e} M. H.},
title = {Introduction to the Book},
booktitle = {Safety, Security and Privacy for Cyber-Physical Systems},
year = {2021},
publisher = {Springer International Publishing},
address = {Cham},
pages = {1--8},
isbn = {978-3-030-65048-3},
doi = {10.1007/978-3-030-65048-3_1},
}@incollection{Teixeira_Springer2021,
author = {Teixeira, Andr{\'e} M. H.},
editor = {Ferrari, Riccardo M.G. and Teixeira, Andr{\'e} M. H.},
title = {Security Metrics for Control Systems},
booktitle = {Safety, Security and Privacy for Cyber-Physical Systems},
year = {2021},
publisher = {Springer International Publishing},
address = {Cham},
pages = {1--8},
isbn = {978-3-030-65048-3},
doi = {10.1007/978-3-030-65048-3_6},
}@incollection{Ferrari_Springer2021,
author = {Ferrari, Riccardo M. G. and Teixeira, Andr{\'e} M. H.},
editor = {Ferrari, Riccardo M.G. and Teixeira, Andr{\'e} M. H.},
title = {Detection of Cyber-Attacks: A Multiplicative Watermarking Scheme},
booktitle = {Safety, Security and Privacy for Cyber-Physical Systems},
year = {2021},
publisher = {Springer International Publishing},
address = {Cham},
pages = {1--8},
isbn = {978-3-030-65048-3},
doi = {10.1007/978-3-030-65048-3_9},
}@article{Rostampour_TAC2020,
author = {Rostampour, V. and Ferrari, R. M.G. and Teixeira, A. M. H. and Keviczky, T.},
journal = {IEEE Trans. Automatic Control},
number = {11},
pages = {5299--5313},
title = {Privatized Distributed Anomaly Detection for Large-Scale Nonlinear Uncertain Systems},
volume = {66},
year = {2021},
doi = {10.1109/TAC.2020.3040251},
}@article{Ferrari_TAC2020,
author = {Ferrari, R. and Teixeira, A. M. H.},
journal = {IEEE Trans. Automatic Control},
number = {6},
pages = {2558--2573},
title = {A Switching Multiplicative Watermarking Scheme for Detection of Stealthy Cyber-Attacks},
volume = {66},
year = {2020},
}@article{Milosevic_TAC2020,
author = {Milosevic, J. and Teixeira, A. M. H. and Sandberg, H. and Johansson, K. H.},
doi = {10.1109/TAC.2020.2981392},
journal = {IEEE Trans. Automatic Control},
number = {9},
pages = {3816--3831},
title = {Actuator Security Indices Based on Perfect Undetectability: Computation, Robustness, and Sensor Placement},
volume = {65},
year = {2020},
}@article{Knorn_CSL2019,
author = {Knorn, S. and Teixeira, A. M. H.},
journal = {IEEE Control Systems Letters},
number = {4},
pages = {829--834},
title = {Effects of Jamming Attacks on a Control System With Energy Harvesting},
volume = {3},
year = {2019},
}@inproceedings{Anand_2020,
address = {Berlin, Germany},
author = {Anand, S. C. and Teixeira, A M H},
booktitle = {IFAC World Congress},
title = {Joint controller and detector design against
data injection attacks on actuators},
year = {2020},
}@inproceedings{Teixeira_CDC2019,
address = {Nice, France},
author = {Teixeira, A. M. H.},
booktitle = {IEEE Conf. Decision and Control},
title = {Optimal stealthy attacks on actuators for strictly proper systems},
year = {2019},
}@inproceedings{Chong_ECC2019,
address = {Napoles, Italy},
author = {Chong, M. S. and Sandberg, H. and Teixeira, A. M. H.},
booktitle = {Eur. Control Conf.},
title = {A Tutorial Introduction to Security and Privacy for Cyber-Physical Systems},
year = {2019},
}@inproceedings{Teixeira_ECC2019,
address = {Napoles, Italy},
author = {Teixeira, A. M. H.},
booktitle = {Eur. Control Conf.},
title = {Data Injection Attacks against Feedforward Controllers},
year = {2019},
}Call: SSF Cyber Security Framework Program, funded by the Swedish Foundation for Strategic Research (SSF)
Awarded to: Thiemo Voigt (UU, PI), Robin Augustin (UU), Anders Ahlén (UU), Subhrakanti Dey (UU)
Implanted devices must be effectively secured to avoid life-threatening scenarios where attackers control implanted devices such as pacemakers or insuline pumps, or install malware inside a human body. This project devises a security architecture for networked implanted medical devices that also enables a secure connection of the in-body network to the Internet. Our architecture ensures confidentiality, integrity and availability of the implanted devices considering also patients’ privacy.
Call: Cyber Security research program, funded by the Dutch Research Council
Awarded to: Pieter van Gelder (TU Delft), Wolter Pieters (TU Delft)
Cyber attacks on critical infrastructures can have devastating consequences for environment, health and even human lives. To improve the protection and resilience, various approaches for security risk assessment, attack detection and safety monitoring have been developed. However, the links between cyber security and safety management are poorly understood, and relevant information is not shared, creating space for malicious activities to pass undetected. The project has two objectives. Firstly, the project will enrich network security monitoring with safety context information. Secondly, the project will improve safety incident response by procedures that include information from security monitoring in assessing the expected effectiveness of responses. The integration of the two innovations will enable adequate responses to flood defense security threats.