Mikel Iturbe
YOU?
Author Swipe
View article: Correction to: CARNYX: A framework for vulnerability detection via power consumption analysis in embedded systems
Correction to: CARNYX: A framework for vulnerability detection via power consumption analysis in embedded systems Open
View article: CARNYX: A framework for vulnerability detection via power consumption analysis in embedded systems
CARNYX: A framework for vulnerability detection via power consumption analysis in embedded systems Open
View article: GAFLERNA Ahoy! Integrating EM Side-Channel Analysis into Traditional Fuzzing Workflows
GAFLERNA Ahoy! Integrating EM Side-Channel Analysis into Traditional Fuzzing Workflows Open
View article: On the use of MiniCPS for conducting rigorous security experiments in Software-Defined Industrial Control Systems
On the use of MiniCPS for conducting rigorous security experiments in Software-Defined Industrial Control Systems Open
Software-Defined Networking (SDN) offers a global view over the network and the ability of centrally and dynamically managing network flows, making them ideal for creating security threat detection and mitigation solutions. Industrial netw…
View article: Software-Defined Networking approaches for intrusion response in Industrial Control Systems: A survey
Software-Defined Networking approaches for intrusion response in Industrial Control Systems: A survey Open
View article: Latentziarik gabeko sareko identifikatzaileen aleatorizazioa kontrol industrialerako sistemetan proaktiboki errekonozimendu erasoak mitigatzeko
Latentziarik gabeko sareko identifikatzaileen aleatorizazioa kontrol industrialerako sistemetan proaktiboki errekonozimendu erasoak mitigatzeko Open
Kontrol industrialerako sistemak askotariko instalazio industrialetan erabiltzen dira, azpiegitura kritikoetan barne, segurtasun-eraso anitzen helburu nagusi bihurtuz. Sare industrialen konfigurazio eta topologia estatikoek, abantaila bat …
View article: Low delay network attributes randomization to proactively mitigate reconnaissance attacks in industrial control systems
Low delay network attributes randomization to proactively mitigate reconnaissance attacks in industrial control systems Open
Industrial Control Systems are used in a wide variety of industrial facilities, including critical infrastructures, becoming the main target of multiple security attacks. A malicious and successful attack against these infrastructures coul…
View article: Improving fuzzing assessment methods through the analysis of metrics and experimental conditions
Improving fuzzing assessment methods through the analysis of metrics and experimental conditions Open
Fuzzing is nowadays one of the most widely used bug hunting techniques. By automatically generating malformed inputs, fuzzing aims to trigger unwanted behavior on its target. While fuzzing research has matured considerably in the last year…
View article: Fuzzing the Internet of Things: A Review on the Techniques and Challenges for Efficient Vulnerability Discovery in Embedded Systems
Fuzzing the Internet of Things: A Review on the Techniques and Challenges for Efficient Vulnerability Discovery in Embedded Systems Open
With a growing number of embedded devices that create, transform and send data autonomously at its core, the Internet-of-Things (IoT) is a reality in different sectors such as manufacturing, healthcare or transportation. With this expansio…
View article: Deep packet inspection for intelligent intrusion detection in software-defined industrial networks: A proof of concept
Deep packet inspection for intelligent intrusion detection in software-defined industrial networks: A proof of concept Open
Specifically tailored industrial control systems (ICSs) attacks are becoming increasingly sophisticated, accentuating the need of ICS cyber security. The nature of these systems makes traditional IT security measures not suitable, requirin…
View article: Truth Will Out
Truth Will Out Open
Recent incidents have shown that Industrial Control Systems (ICS) are becoming increasingly susceptible to sophisticated and targeted attacks initiated by adversaries with high motivation, domain knowledge, and resources. Although traditio…
View article: Null is Not Always Empty: Monitoring the Null Space for Field-Level Anomaly Detection in Industrial IoT Environments
Null is Not Always Empty: Monitoring the Null Space for Field-Level Anomaly Detection in Industrial IoT Environments Open
Industrial environments have vastly changed sincethe conception of initial primitive and isolated networks. Thecurrent full interconnection paradigm, where connectivity be-tween different devices and the Internet has become a businessneces…
View article: Towards Large-Scale, Heterogeneous Anomaly Detection Systems in Industrial Networks: A Survey of Current Trends
Towards Large-Scale, Heterogeneous Anomaly Detection Systems in Industrial Networks: A Survey of Current Trends Open
Industrial Networks (INs) are widespread environments where heterogeneous devices collaborate to control and monitor physical processes. Some of the controlled processes belong to Critical Infrastructures (CIs), and, as such, IN protection…
View article: Software Defined Networking Opportunities for Intelligent Security Enhancement of Industrial Control Systems
Software Defined Networking Opportunities for Intelligent Security Enhancement of Industrial Control Systems Open
View article: Visualizing Network Flows and Related Anomalies in Industrial Networks using Chord Diagrams and Whitelisting
Visualizing Network Flows and Related Anomalies in Industrial Networks using Chord Diagrams and Whitelisting Open
Industrial Control Systems are the set of specialized elements that monitor and control physical processes. Those systems are normally interconnected forming environments known as industrial networks. The particularities of these networks …