2021
DOI: 10.1016/j.ijcip.2020.100407
|View full text |Cite
|
Sign up to set email alerts
|

Critical infrastructure protection system design based on SCOUT multitech seCurity system for intercOnnected space control groUnd staTions

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

0
4
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
1
1
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(4 citation statements)
references
References 7 publications
0
4
0
Order By: Relevance
“…The driving force of this work is the potential for an attacker to inoculate an APT within a naval radar system. While previous research of Longo et al, Kessler and Shepard [3], [4] has already explored this possibility, and Cherminod, Cantelli-Forti et al [5], [6] proposed solutions to industrial networking attacks via Software Defined Networks, our study takes a step further. We demonstrate that a compromised radar system can exploit GANs to produce deceptive ISAR images inside the processing unit, a threat not yet considered.…”
Section: Related Workmentioning
confidence: 89%
See 1 more Smart Citation
“…The driving force of this work is the potential for an attacker to inoculate an APT within a naval radar system. While previous research of Longo et al, Kessler and Shepard [3], [4] has already explored this possibility, and Cherminod, Cantelli-Forti et al [5], [6] proposed solutions to industrial networking attacks via Software Defined Networks, our study takes a step further. We demonstrate that a compromised radar system can exploit GANs to produce deceptive ISAR images inside the processing unit, a threat not yet considered.…”
Section: Related Workmentioning
confidence: 89%
“…In the case of Supply Chain compromission, this flexible reconfigurable computing capability of FPGAs makes them a prime target for APTs seeking to manipulate radar systems. In fact, the presence of an FPGA shifts the "cyber perimeter", eliminating the possibility of malicious code installation but also preventing the implementation of Host System and Network Security probes [3] so making the attack difficult to mitigate [6].…”
Section: B Apt Hide and Seek: Unusual Residences For Advanced Persist...mentioning
confidence: 99%
“…The driving force of this work is the potential for an attacker to inoculate an APT within a naval radar system. While previous research of Longo et al, Kessler and Shepard [3], [4] has already explored this possibility, and Cherminod, Cantelli-Forti et al [5], [6] proposed solutions to industrial networking attacks via Software Defined Networks, our study takes a step further. We demonstrate that a compromised radar system can exploit GANs to produce deceptive ISAR images inside the processing unit, a threat not yet considered.…”
Section: Related Workmentioning
confidence: 92%
“…In the case of Supply Chain compromission, this flexible reconfigurable computing capability of FPGAs makes them a prime target for APTs seeking to manipulate radar systems. In fact, the presence of an FPGA shifts the "cyber perimeter", eliminating the possibility of malicious code installation but also preventing the implementation of Host System and Network Security probes [3] so making the attack difficult to mitigate [6].…”
Section: B Apt Hide and Seek: Unusual Residences For Advanced Persist...mentioning
confidence: 99%