{"id":"https://openalex.org/W3168723494","doi":"https://doi.org/10.1109/tdsc.2021.3089163","title":"This Hacker Knows Physics: Device Physics Aware Mimicry Attacks in Cyber-Physical Systems","display_name":"This Hacker Knows Physics: Device Physics Aware Mimicry Attacks in Cyber-Physical Systems","publication_year":2021,"publication_date":"2021-06-14","ids":{"openalex":"https://openalex.org/W3168723494","doi":"https://doi.org/10.1109/tdsc.2021.3089163","mag":"3168723494"},"language":"en","primary_location":{"id":"doi:10.1109/tdsc.2021.3089163","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2021.3089163","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5054310469","display_name":"Qinchen Gu","orcid":"https://orcid.org/0000-0001-5678-5212"},"institutions":[{"id":"https://openalex.org/I130701444","display_name":"Georgia Institute of Technology","ror":"https://ror.org/01zkghx44","country_code":"US","type":"education","lineage":["https://openalex.org/I130701444"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Qinchen Gu","raw_affiliation_strings":["Department of Electrical and Computer Engineering, Georgia Institute of Technology, Atlanta, GA, USA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, Georgia Institute of Technology, Atlanta, GA, USA","institution_ids":["https://openalex.org/I130701444"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5057203407","display_name":"David Formby","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"David Formby","raw_affiliation_strings":["Fortiphyd Logic, Atlanta, GA, USA"],"affiliations":[{"raw_affiliation_string":"Fortiphyd Logic, Atlanta, GA, USA","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5058611515","display_name":"Shouling Ji","orcid":"https://orcid.org/0000-0003-4268-372X"},"institutions":[{"id":"https://openalex.org/I76130692","display_name":"Zhejiang University","ror":"https://ror.org/00a2xv884","country_code":"CN","type":"education","lineage":["https://openalex.org/I76130692"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shouling Ji","raw_affiliation_strings":["Zhejiang University, Hangzhou, Zhejiang, China"],"affiliations":[{"raw_affiliation_string":"Zhejiang University, Hangzhou, Zhejiang, China","institution_ids":["https://openalex.org/I76130692"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5021029981","display_name":"Brendan Saltaformaggio","orcid":"https://orcid.org/0000-0001-5859-6925"},"institutions":[{"id":"https://openalex.org/I130701444","display_name":"Georgia Institute of Technology","ror":"https://ror.org/01zkghx44","country_code":"US","type":"education","lineage":["https://openalex.org/I130701444"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Brendan Saltaformaggio","raw_affiliation_strings":["Department of Electrical and Computer Engineering, Georgia Institute of Technology, Atlanta, GA, USA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, Georgia Institute of Technology, Atlanta, GA, USA","institution_ids":["https://openalex.org/I130701444"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5053282089","display_name":"Anu G. Bourgeois","orcid":"https://orcid.org/0000-0002-4705-4888"},"institutions":[{"id":"https://openalex.org/I181565077","display_name":"Georgia State University","ror":"https://ror.org/03qt6ba18","country_code":"US","type":"education","lineage":["https://openalex.org/I181565077"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Anu Bourgeois","raw_affiliation_strings":["Department of Computer Science, Georgia State University, Atlanta, GA, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Georgia State University, Atlanta, GA, USA","institution_ids":["https://openalex.org/I181565077"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5033073212","display_name":"Raheem Beyah","orcid":"https://orcid.org/0000-0002-9188-3464"},"institutions":[{"id":"https://openalex.org/I130701444","display_name":"Georgia Institute of Technology","ror":"https://ror.org/01zkghx44","country_code":"US","type":"education","lineage":["https://openalex.org/I130701444"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Raheem Beyah","raw_affiliation_strings":["Department of Electrical and Computer Engineering, Georgia Institute of Technology, Atlanta, GA, USA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, Georgia Institute of Technology, Atlanta, GA, USA","institution_ids":["https://openalex.org/I130701444"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5054310469"],"corresponding_institution_ids":["https://openalex.org/I130701444"],"apc_list":null,"apc_paid":null,"fwci":0.4692,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.58470788,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":"19","issue":"5","first_page":"3218","last_page":"3230"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.7376435995101929},{"id":"https://openalex.org/keywords/spoofing-attack","display_name":"Spoofing attack","score":0.7202205061912537},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7159977555274963},{"id":"https://openalex.org/keywords/cyber-physical-system","display_name":"Cyber-physical system","score":0.6189805865287781},{"id":"https://openalex.org/keywords/hacker","display_name":"Hacker","score":0.6173170804977417},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.5728200674057007},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4919597804546356},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3342156410217285},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.1075950562953949}],"concepts":[{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.7376435995101929},{"id":"https://openalex.org/C167900197","wikidata":"https://www.wikidata.org/wiki/Q11081100","display_name":"Spoofing attack","level":2,"score":0.7202205061912537},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7159977555274963},{"id":"https://openalex.org/C179768478","wikidata":"https://www.wikidata.org/wiki/Q1120057","display_name":"Cyber-physical system","level":2,"score":0.6189805865287781},{"id":"https://openalex.org/C86844869","wikidata":"https://www.wikidata.org/wiki/Q2798820","display_name":"Hacker","level":2,"score":0.6173170804977417},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.5728200674057007},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4919597804546356},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3342156410217285},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.1075950562953949}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tdsc.2021.3089163","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2021.3089163","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.6299999952316284}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":21,"referenced_works":["https://openalex.org/W207267598","https://openalex.org/W1516211918","https://openalex.org/W2056451850","https://openalex.org/W2101881870","https://openalex.org/W2123990969","https://openalex.org/W2135143063","https://openalex.org/W2143842190","https://openalex.org/W2159059513","https://openalex.org/W2167332015","https://openalex.org/W2276186381","https://openalex.org/W2535751405","https://openalex.org/W2578943040","https://openalex.org/W2613412685","https://openalex.org/W2620708834","https://openalex.org/W2771494169","https://openalex.org/W2889033824","https://openalex.org/W2890591751","https://openalex.org/W2897602411","https://openalex.org/W6630877225","https://openalex.org/W6694741842","https://openalex.org/W6738549363"],"related_works":["https://openalex.org/W2921504876","https://openalex.org/W1982580243","https://openalex.org/W2183730421","https://openalex.org/W2551868243","https://openalex.org/W2348153269","https://openalex.org/W4205613068","https://openalex.org/W2998478967","https://openalex.org/W2614907253","https://openalex.org/W4308237908","https://openalex.org/W4323786161"],"abstract_inverted_index":{"Recent":[0],"work":[1],"proposed":[2],"to":[3,27,87,112,124,129],"improve":[4],"the":[5,11,15,20,24,28,32,36,39,58,61,77,89,96,103,110,114,117,130,136,139,143],"security":[6],"of":[7,38,60,135,145],"CPSs":[8],"by":[9,84],"authenticating":[10],"CPS":[12,62,90],"devices":[13,115,137],"through":[14],"device":[16,66,91,97],"operation":[17,59,98],"times":[18],"in":[19,48,109,116,138,148],"response":[21,79,126],"packets":[22,80,111,127],"from":[23],"devices,":[25],"due":[26],"strong":[29],"correlation":[30],"between":[31],"timing":[33,104],"fingerprints":[34],"and":[35,105,133],"physics":[37,67],"devices.":[40,153],"Although":[41],"such":[42,166],"a":[43,65],"technique":[44,147],"may":[45,56,162],"be":[46,82,122,163],"effective":[47],"defending":[49],"against":[50,165],"naive":[51],"attackers,":[52],"an":[53,85,157],"advanced":[54],"attacker":[55,86],"monitor":[57],"before":[63],"launching":[64],"aware":[68],"mimicry":[69,167],"attack.":[70],"In":[71],"this":[72],"paper,":[73],"we":[74,101,155],"show":[75],"how":[76],"spoofed":[78],"can":[81,121],"crafted":[83],"deceive":[88],"authentication":[92],"method":[93],"based":[94],"on":[95],"times.":[99],"Specifically,":[100],"use":[102],"physical":[106,118],"measurements":[107],"embedded":[108],"reconstruct":[113],"system,":[119],"which":[120],"used":[123,164],"spoof":[125],"corresponding":[128],"actual":[131],"model":[132],"configuration":[134],"CPS.":[140],"We":[141],"demonstrate":[142],"performance":[144],"our":[146],"realistic":[149],"testbeds":[150],"with":[151],"real":[152],"Finally,":[154],"propose":[156],"upgraded":[158],"defense":[159],"mechanism":[160],"that":[161],"attacks.":[168]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":1}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
