{"id":"https://openalex.org/W2568356656","doi":"https://doi.org/10.1109/cdc.2016.7799183","title":"Zero-stealthy attack for sampled-data control systems: The case of faster actuation than sensing","display_name":"Zero-stealthy attack for sampled-data control systems: The case of faster actuation than sensing","publication_year":2016,"publication_date":"2016-12-01","ids":{"openalex":"https://openalex.org/W2568356656","doi":"https://doi.org/10.1109/cdc.2016.7799183","mag":"2568356656"},"language":"en","primary_location":{"id":"doi:10.1109/cdc.2016.7799183","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cdc.2016.7799183","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2016 IEEE 55th Conference on Decision and Control (CDC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5018605846","display_name":"Jihan Kim","orcid":"https://orcid.org/0000-0002-3844-8789"},"institutions":[{"id":"https://openalex.org/I139264467","display_name":"Seoul National University","ror":"https://ror.org/04h9pn542","country_code":"KR","type":"education","lineage":["https://openalex.org/I139264467"]}],"countries":["KR"],"is_corresponding":true,"raw_author_name":"Jihan Kim","raw_affiliation_strings":["ASRI, Seoul National University, Korea"],"affiliations":[{"raw_affiliation_string":"ASRI, Seoul National University, Korea","institution_ids":["https://openalex.org/I139264467"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5024045458","display_name":"Gyunghoon Park","orcid":"https://orcid.org/0000-0001-8339-5359"},"institutions":[{"id":"https://openalex.org/I139264467","display_name":"Seoul National University","ror":"https://ror.org/04h9pn542","country_code":"KR","type":"education","lineage":["https://openalex.org/I139264467"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Gyunghoon Park","raw_affiliation_strings":["ASRI, Seoul National University, Korea"],"affiliations":[{"raw_affiliation_string":"ASRI, Seoul National University, Korea","institution_ids":["https://openalex.org/I139264467"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5055470439","display_name":"Hyungbo Shim","orcid":"https://orcid.org/0000-0002-5972-8114"},"institutions":[{"id":"https://openalex.org/I139264467","display_name":"Seoul National University","ror":"https://ror.org/04h9pn542","country_code":"KR","type":"education","lineage":["https://openalex.org/I139264467"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Hyungbo Shim","raw_affiliation_strings":["ASRI, Seoul National University, Korea"],"affiliations":[{"raw_affiliation_string":"ASRI, Seoul National University, Korea","institution_ids":["https://openalex.org/I139264467"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5027782566","display_name":"Yongsoon Eun","orcid":"https://orcid.org/0000-0002-2304-7106"},"institutions":[{"id":"https://openalex.org/I193352282","display_name":"Daegu Gyeongbuk Institute of Science and Technology","ror":"https://ror.org/03frjya69","country_code":"KR","type":"education","lineage":["https://openalex.org/I193352282"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Yongsoon Eun","raw_affiliation_strings":["Department of Information & Communication Engineering, Daegu Gyeongbuk Institute of Science & Technology, Korea"],"affiliations":[{"raw_affiliation_string":"Department of Information & Communication Engineering, Daegu Gyeongbuk Institute of Science & Technology, Korea","institution_ids":["https://openalex.org/I193352282"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5018605846"],"corresponding_institution_ids":["https://openalex.org/I139264467"],"apc_list":null,"apc_paid":null,"fwci":1.6069,"has_fulltext":false,"cited_by_count":20,"citation_normalized_percentile":{"value":0.85557075,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"5956","last_page":"5961"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12495","display_name":"Electrostatic Discharge in Electronics","score":0.9833999872207642,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11005","display_name":"Radiation Effects in Electronics","score":0.9769999980926514,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/actuator","display_name":"Actuator","score":0.6191800832748413},{"id":"https://openalex.org/keywords/signal","display_name":"SIGNAL (programming language)","score":0.6125982403755188},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.5902186036109924},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5852173566818237},{"id":"https://openalex.org/keywords/controller","display_name":"Controller (irrigation)","score":0.5750898122787476},{"id":"https://openalex.org/keywords/cyber-physical-system","display_name":"Cyber-physical system","score":0.5638829469680786},{"id":"https://openalex.org/keywords/control-theory","display_name":"Control theory (sociology)","score":0.5295984148979187},{"id":"https://openalex.org/keywords/detector","display_name":"Detector","score":0.4705023467540741},{"id":"https://openalex.org/keywords/control-system","display_name":"Control system","score":0.466136634349823},{"id":"https://openalex.org/keywords/kernel","display_name":"Kernel (algebra)","score":0.46150070428848267},{"id":"https://openalex.org/keywords/sampling","display_name":"Sampling (signal processing)","score":0.45948776602745056},{"id":"https://openalex.org/keywords/sampled-data-systems","display_name":"Sampled data systems","score":0.4576422870159149},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.4214927554130554},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.36897507309913635},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.340135782957077},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.24540984630584717},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2327112853527069},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.10710671544075012},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.10148915648460388},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.08068397641181946}],"concepts":[{"id":"https://openalex.org/C172707124","wikidata":"https://www.wikidata.org/wiki/Q423488","display_name":"Actuator","level":2,"score":0.6191800832748413},{"id":"https://openalex.org/C2779843651","wikidata":"https://www.wikidata.org/wiki/Q7390335","display_name":"SIGNAL (programming language)","level":2,"score":0.6125982403755188},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.5902186036109924},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5852173566818237},{"id":"https://openalex.org/C203479927","wikidata":"https://www.wikidata.org/wiki/Q5165939","display_name":"Controller (irrigation)","level":2,"score":0.5750898122787476},{"id":"https://openalex.org/C179768478","wikidata":"https://www.wikidata.org/wiki/Q1120057","display_name":"Cyber-physical system","level":2,"score":0.5638829469680786},{"id":"https://openalex.org/C47446073","wikidata":"https://www.wikidata.org/wiki/Q5165890","display_name":"Control theory (sociology)","level":3,"score":0.5295984148979187},{"id":"https://openalex.org/C94915269","wikidata":"https://www.wikidata.org/wiki/Q1834857","display_name":"Detector","level":2,"score":0.4705023467540741},{"id":"https://openalex.org/C17500928","wikidata":"https://www.wikidata.org/wiki/Q959968","display_name":"Control system","level":2,"score":0.466136634349823},{"id":"https://openalex.org/C74193536","wikidata":"https://www.wikidata.org/wiki/Q574844","display_name":"Kernel (algebra)","level":2,"score":0.46150070428848267},{"id":"https://openalex.org/C140779682","wikidata":"https://www.wikidata.org/wiki/Q210868","display_name":"Sampling (signal processing)","level":3,"score":0.45948776602745056},{"id":"https://openalex.org/C90794131","wikidata":"https://www.wikidata.org/wiki/Q7410146","display_name":"Sampled data systems","level":3,"score":0.4576422870159149},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.4214927554130554},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.36897507309913635},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.340135782957077},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.24540984630584717},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2327112853527069},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.10710671544075012},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.10148915648460388},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.08068397641181946},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C6557445","wikidata":"https://www.wikidata.org/wiki/Q173113","display_name":"Agronomy","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C119599485","wikidata":"https://www.wikidata.org/wiki/Q43035","display_name":"Electrical engineering","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C114614502","wikidata":"https://www.wikidata.org/wiki/Q76592","display_name":"Combinatorics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/cdc.2016.7799183","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cdc.2016.7799183","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2016 IEEE 55th Conference on Decision and Control (CDC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.4699999988079071,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":18,"referenced_works":["https://openalex.org/W597444017","https://openalex.org/W792485588","https://openalex.org/W1557652964","https://openalex.org/W1571323288","https://openalex.org/W1882014851","https://openalex.org/W1972523481","https://openalex.org/W1972757409","https://openalex.org/W1992587486","https://openalex.org/W2000457734","https://openalex.org/W2038651258","https://openalex.org/W2053294619","https://openalex.org/W2112210020","https://openalex.org/W2143741011","https://openalex.org/W2155589794","https://openalex.org/W2555431798","https://openalex.org/W2568239832","https://openalex.org/W2964127075","https://openalex.org/W3146822316"],"related_works":["https://openalex.org/W3004173571","https://openalex.org/W2546638913","https://openalex.org/W2209816623","https://openalex.org/W2968885840","https://openalex.org/W3017360834","https://openalex.org/W2008822734","https://openalex.org/W3135700974","https://openalex.org/W4313307484","https://openalex.org/W2086962923","https://openalex.org/W3094048663"],"abstract_inverted_index":{"In":[0],"this":[1,104,138],"paper,":[2],"we":[3],"introduce":[4],"a":[5,24,31],"new":[6,139],"vulnerability":[7],"of":[8,83,106],"cyber-physical":[9],"systems":[10],"to":[11],"malicious":[12],"attack.":[13],"It":[14],"arises":[15],"when":[16,110],"the":[17,35,45,49,58,61,76,81,84,92,95,111,118,134],"physical":[18],"system,":[19,27],"that":[20,70,103,127],"is":[21,28,37,108,124],"modeled":[22],"as":[23],"continuous-time":[25],"LTI":[26],"controlled":[29],"by":[30],"digital":[32],"controller,":[33],"i.e.,":[34],"output":[36,50,59,62,85,129],"measured":[38],"only":[39],"at":[40,65,87],"discrete":[41],"sensing":[42,66,89],"times.":[43,67],"Since":[44],"anomaly":[46],"detector":[47],"monitors":[48],"signal,":[51],"nothing":[52],"abnormal":[53],"can":[54],"be":[55],"detected":[56],"through":[57,80],"if":[60,71],"looks":[63],"normal":[64],"This":[68],"implies":[69],"an":[72],"(actuator)":[73],"attack":[74,93,107,140],"drives":[75],"internal":[77],"states":[78],"passing":[79],"kernel":[82],"matrix":[86],"each":[88],"time,":[90],"then":[91],"compromises":[94],"system":[96,113],"while":[97],"it":[98],"remains":[99],"stealthy.":[100],"We":[101],"show":[102],"type":[105],"feasible":[109],"control":[112],"uses":[114],"multi-rate":[115],"sampling,":[116],"and":[117],"sampling":[119],"rate":[120],"for":[121,128,133],"input":[122],"signal":[123],"higher":[125],"than":[126],"measurements.":[130],"Simulation":[131],"results":[132],"X-38":[135],"vehicle":[136],"illustrate":[137],"strategy":[141],"possibly":[142],"brings":[143],"disastrous":[144],"consequences.":[145]},"counts_by_year":[{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":3},{"year":2020,"cited_by_count":4},{"year":2019,"cited_by_count":4},{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
