Strategies against replay attacks

T Aura - Proceedings 10th Computer Security Foundations …, 1997 - ieeexplore.ieee.org
… The goal of this paper is to present a set of designprinciples for avoiding replay attacks in
cryptographic protocols. The principles are easily applied to real protocols and they do not …

Secure control against replay attacks

Y Mo, B Sinopoli - 2009 47th annual Allerton conference on …, 2009 - ieeexplore.ieee.org
… As discussed in the previous section, there exist control systems that are not resilient to the
replay attack. In this section, we want to design a detection strategy against replay attacks. …

Reinforcement learning solution for cyber-physical systems security against replay attacks

Y Yu, W Yang, W Ding, J Zhou - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
… learn and recognize the evolving attacks with more effectiveness. … attack strategies purposefully
according to the actions of defenders. Thus, we propose a new defense strategy against

Security analysis and fault detection against stealthy replay attacks

A Zaman, B Safarinejadian, W Birk - International Journal of …, 2022 - Taylor & Francis
… in the system, the KL divergence criterion has a zero value since the previously developed
fault detection strategy did not consider cases with replay attacks. Based on the fact that the …

Coping with packet replay attacks in wireless networks

Z Feng, J Ning, I Broustis, K Pelechrinis… - 2011 8th Annual …, 2011 - ieeexplore.ieee.org
against replay attacks [17]. Similar time-stamping strategies for mitigating replay attacks have
… overhead and the protection level against the replay attack, we utilize the understanding …

[PDF][PDF] Replay attack vulnerabilities and mitigation strategies

A Goldschmidt - 2015 - cs.tufts.edu
… from attacks based on decryption to attacks based in replay of encrypted information is almost
inevitable. In this project, replay attacks … , along with several ways to protect against them. …

Resilient control for cyber-physical systems subject to replay attacks

G Franze, F Tedesco, W Lucia - IEEE Control Systems Letters, 2019 - ieeexplore.ieee.org
… Abstract—In this letter, a resilient control strategy against replay attacks is developed for
discrete-time linear systems subject to state and input constraints, bounded disturbances, and …

Tec-tree: A low-cost, parallelizable tree for efficient defense against memory replay attacks

R Elbaz, D Champagne, RB Lee, L Torres… - … and Embedded Systems …, 2007 - Springer
… We consider there are three distinct strategies for implementing a memory integrity protection
mechanism on a computing platform: i) regular hashes, ii) Message Authentication Codes (…

Stochastic game approach for replay attack detection

F Miao, M Pajic, GJ Pappas - 52nd IEEE conference on …, 2013 - ieeexplore.ieee.org
strategy for the system exists, and present a suboptimal algorithm used to calculate the
system’s strategy by … to provide system resiliency against other types of attacks, and revise the …

Detection and control against replay attacks in smart grid

J Zhao, J Wang, L Yin - 2016 12th International Conference on …, 2016 - ieeexplore.ieee.org
… grid networked systems - replay attacks, which can result in … resist the replay attack, the
paper designs a new strategy that … We call this way of attack as Replay attack (Replay attack) [8]…