Alvaro A. Cárdenas

Orcid: 0000-0002-5142-9750

Affiliations:
  • University of California, Santa Cruz, CA, USA
  • University of Texas, Dallas, TX, USA (former)
  • University of California, Berkeley, CA, USA (former)


According to our database1, Alvaro A. Cárdenas authored at least 144 papers between 2004 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
SCADA World: An Exploration of the Diversity in Power Grid Networks.
Proc. ACM Meas. Anal. Comput. Syst., 2024

SoK: Security of Programmable Logic Controllers.
Proceedings of the 33rd USENIX Security Symposium, 2024

A Tale of Two Industroyers: It was the Season of Darkness.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

Fast Attack Recovery for Stochastic Cyber-Physical Systems.
Proceedings of the 30th IEEE Real-Time and Embedded Technology and Applications Symposium, 2024

By the Numbers: Towards Standard Evaluation Metrics for Programmable Logic Controllers' Defenses.
Proceedings of the 2024 Workshop on Re-design Industrial Control Systems with Security, 2024

From Power to Water: Dissecting SCADA Networks Across Different Critical Infrastructures.
Proceedings of the Passive and Active Measurement - 25th International Conference, 2024

Keynote: A Tale of Two Industroyers: It was the Season of Darkness.
Proceedings of the 10th ACM Cyber-Physical System Security Workshop, 2024

ICSNet: A Hybrid-Interaction Honeynet for Industrial Control Systems.
Proceedings of the Sixth Workshop on CPS&IoT Security and Privacy, 2024

Keynote: Physics and Security: Then and Now.
Proceedings of the Sixth Workshop on CPS&IoT Security and Privacy, 2024

Ghost in the SAM: Stealthy, Robust, and Privileged Persistence through Invisible Accounts.
Proceedings of the 2024 Workshop on Research on offensive and defensive techniques in the context of Man At The End (MATE) attacks, 2024

2023
Attacking the grid: Lessons from a guerrilla conflict and efforts for peace in Colombia: 1990-2018.
Int. J. Crit. Infrastructure Prot., September, 2023

A Taxonomy of Industrial Control Protocols and Networks in the Power Grid.
IEEE Commun. Mag., June, 2023

Digital Substations and IEC 61850: A Primer.
IEEE Commun. Mag., June, 2023

Resilient Structural Sparsity in the Design of Consensus Networks.
IEEE Trans. Cybern., May, 2023

Online Attack Recovery in Cyberphysical Systems.
IEEE Secur. Priv., 2023

Smart Grid Cyber-Physical Situational Awareness of Complex Operational Technology Attacks: A Review.
ACM Comput. Surv., 2023

Provable Adversarial Safety in Cyber-Physical Systems.
Proceedings of the 8th IEEE European Symposium on Security and Privacy, 2023

An Observer-based Switching Algorithm for Safety under Sensor Denial-of-Service Attacks.
Proceedings of the American Control Conference, 2023

2022
Digital Twins for Cyber-Physical Systems Security (Dagstuhl Seminar 22171).
Dagstuhl Reports, 2022

A fast and accurate threat detection and prevention architecture using stream processing.
Concurr. Comput. Pract. Exp., 2022

On the Stability of Cyber-Physical Control Systems With Sensor Multiplicative Attacks.
IEEE Access, 2022

MaDIoT 2.0: Modern High-Wattage IoT Botnet Attacks and Defenses.
Proceedings of the 31st USENIX Security Symposium, 2022

You Can't Protect What You Don't Understand: Characterizing an Operational Gas SCADA Network.
Proceedings of the 43rd IEEE Security and Privacy, 2022

Timing Analysis of GOOSE in a Real-World Substation.
Proceedings of the IEEE International Conference on Communications, 2022

Fuzzing Malicious Driving Behavior to find Vulnerabilities in Collision Avoidance Systems.
Proceedings of the IEEE European Symposium on Security and Privacy, 2022

Control Barrier Function-Based Attack-Recovery with Provable Guarantees.
Proceedings of the 61st IEEE Conference on Decision and Control, 2022

Private Anomaly Detection in Linear Controllers: Garbled Circuits vs. Homomorphic Encryption.
Proceedings of the 61st IEEE Conference on Decision and Control, 2022

Sampling-based Computation of Viability Domain to Prevent Safety Violations by Attackers.
Proceedings of the IEEE Conference on Control Technology and Applications, 2022

CPSS '22: 8th ACM Cyber-Physical System Security Workshop.
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022

2021
Message from the General Chair.
Proceedings of the IEEE Security and Privacy Workshops, 2021

AttkFinder: Discovering Attack Vectors in PLC Programs using Information Flow Analysis.
Proceedings of the RAID '21: 24th International Symposium on Research in Attacks, 2021

You Make Me Tremble: A First Look at Attacks Against Structural Control Systems.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

MaMIoT: Manipulation of Energy Market Leveraging High Wattage IoT Botnets.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

Shared Reality: Detecting Stealthy Attacks Against Autonomous Vehicles.
Proceedings of the CPSIoTSec '21: Proceedings of the 2th Workshop on CPS&IoT Security and Privacy, 2021

2020
Guest Editorial: Special Section on Security and Privacy in Industry 4.0.
IEEE Trans. Ind. Informatics, 2020

Introduction to the Special Issue on User-Centric Security and Safety for CPS.
ACM Trans. Cyber Phys. Syst., 2020

SAVIOR: Securing Autonomous Vehicles with Robust Physical Invariants.
Proceedings of the 29th USENIX Security Symposium, 2020

Real-Time Attack-Recovery for Cyber-Physical Systems Using Linear Approximations.
Proceedings of the 41st IEEE Real-Time Systems Symposium, 2020

Adversarial Classification Under Differential Privacy.
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020

Uncharted Networks: A First Measurement Study of the Bulk Power System.
Proceedings of the IMC '20: ACM Internet Measurement Conference, 2020

The more the merrier: adding hidden measurements to secure industrial control systems.
Proceedings of the 7th Annual Symposium on Hot Topics in the Science of Security, 2020

DARIA: Designing Actuators to Resist Arbitrary Attacks Against Cyber-Physical Systems.
Proceedings of the IEEE European Symposium on Security and Privacy, 2020

Dynamic Sensor Processing for Securing Unmanned Vehicles.
Proceedings of the Dynamic Data Driven Applications Systems, 2020

Towards a High-Fidelity Network Emulation of IEC 104 SCADA Systems.
Proceedings of the CPSIOTSEC'20: Proceedings of the 2020 Joint Workshop on CPS&IoT Security and Privacy, 2020

2019
Impact of the Market Infrastructure on the Security of Smart Grids.
IEEE Trans. Ind. Informatics, 2019

Improving the Security of Visual Challenges.
ACM Trans. Cyber Phys. Syst., 2019

A business that can't lose: Investing in attacks against the Colombian power grid.
Int. J. Crit. Infrastructure Prot., 2019

Stealing, Spying, and Abusing: Consequences of Attacks on Internet of Things Devices.
IEEE Secur. Priv., 2019

Mitigating Sensor Attacks Against Industrial Control Systems.
IEEE Access, 2019

Not Everything is Dark and Gloomy: Power Grid Protections Against IoT Demand Attacks.
Proceedings of the 28th USENIX Security Symposium, 2019

IEC 60870-5-104 Network Characterization of a Large-Scale Operational Power Grid.
Proceedings of the 2019 IEEE Security and Privacy Workshops, 2019

Privacy and Security in Internet-Connected Cameras.
Proceedings of the 2019 IEEE International Congress on Internet of Things, 2019

A new metric to compare anomaly detection algorithms in cyber-physical systems.
Proceedings of the 6th Annual Symposium on Hot Topics in the Science of Security, 2019

Enhancing the Resiliency of Cyber-Physical Systems with Software-Defined Networks.
Proceedings of the ACM Workshop on Cyber-Physical Systems Security & Privacy, 2019

A Moving Target Defense to Detect Stealthy Attacks in Cyber-Physical Systems.
Proceedings of the 2019 American Control Conference, 2019

Hide and Seek: An Architecture for Improving Attack-Visibility in Industrial Control Systems.
Proceedings of the Applied Cryptography and Network Security, 2019

Profiling Communications in Industrial IP Networks: Model Complexity and Anomaly Detection.
Proceedings of the Security and Privacy Trends in the Industrial Internet of Things, 2019

2018
DDDAS for Attack Detection and Isolation of Control Systems.
Proceedings of the Handbook of Dynamic Data Driven Applications Systems., 2018

Quantifying the Utility-Privacy Tradeoff in the Internet of Things.
ACM Trans. Cyber Phys. Syst., 2018

Leveraging Software-Defined Networking for Incident Response in Industrial Control Systems.
IEEE Softw., 2018

A Survey of Physics-Based Attack Detection in Cyber-Physical Systems.
ACM Comput. Surv., 2018

Virtual incident response functions in control systems.
Comput. Networks, 2018

ALERT: Adding a Secure Layer in Decision Support for Advanced Driver Assistance System (ADAS).
Proceedings of the 2018 ACM Multimedia Conference on Multimedia Conference, 2018

Measuring the Growth in Complexity of Models from Industrial Control Networks.
Proceedings of the 2018 IEEE International Conference on Information Reuse and Integration, 2018

A Virtual Environment for Industrial Control Systems: A Nonlinear Use-Case in Attack Detection, Identification, and Response.
Proceedings of the 4th Annual Industrial Control System Security Workshop, 2018

An Adaptive Real-Time Architecture for Zero-Day Threat Detection.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

Cyber-Insurance for Cyber-Physical Systems.
Proceedings of the IEEE Conference on Control Technology and Applications, 2018

Temporal Phase Shifts in SCADA Networks.
Proceedings of the 2018 Workshop on Cyber-Physical Systems Security and PrivaCy, 2018

Constraining Attacker Capabilities Through Actuator Saturation.
Proceedings of the 2018 Annual American Control Conference, 2018

2017
SDN and NFV Security: Challenges for Integrated Solutions.
Proceedings of the Guide to Security in SDN and NFV, 2017

Smart Grids.
IEEE Wirel. Commun., 2017

Integrity Attacks on Real-Time Pricing in Smart Grids: Impact and Countermeasures.
IEEE Trans. Smart Grid, 2017

Guest Editors' Introduction: Cyber-Physical Systems Security and Privacy.
IEEE Des. Test, 2017

Security and Privacy in Cyber-Physical Systems: A Survey of Surveys.
IEEE Des. Test, 2017

Corrections.
IEEE Des. Test, 2017

Leveraging Unique CPS Properties to Design Better Privacy-Enhancing Algorithms.
Proceedings of the Hot Topics in Science of Security: Symposium and Bootcamp, HoTSoS 2017, 2017

Optimal Security Investments in a Prevention and Detection Game.
Proceedings of the Hot Topics in Science of Security: Symposium and Bootcamp, HoTSoS 2017, 2017

Security and privacy trade-offs in CPS by leveraging inherent differential privacy.
Proceedings of the IEEE Conference on Control Technology and Applications, 2017

Optimal risk management in critical infrastructures against cyber-adversaries.
Proceedings of the IEEE Conference on Control Technology and Applications, 2017

Sexual Intimacy in the Age of Smart Devices: Are We Practicing Safe IoT?
Proceedings of the 2017 Workshop on Internet of Things Security and Privacy, 2017

Remote Proofs of Video Freshness for Public Spaces.
Proceedings of the 2017 Workshop on Cyber-Physical Systems Security and PrivaCy, 2017

Understanding Security Threats in Consumer Drones Through the Lens of the Discovery Quadcopter Family.
Proceedings of the 2017 Workshop on Internet of Things Security and Privacy, 2017

Security & Privacy in Smart Toys.
Proceedings of the 2017 Workshop on Internet of Things Security and Privacy, 2017

A New Burst-DFA model for SCADA Anomaly Detection.
Proceedings of the 2017 Workshop on Cyber-Physical Systems Security and PrivaCy, 2017

Security analysis of control system anomaly detectors.
Proceedings of the 2017 American Control Conference, 2017

Security vs. privacy: How integrity attacks can be masked by the noise of differential privacy.
Proceedings of the 2017 American Control Conference, 2017

2016
Cyber-Physical Security and Privacy [Guest editors' introduction].
IEEE Internet Comput., 2016

Attacking Fieldbus Communications in ICS: Applications to the SWaT Testbed.
Proceedings of the Singapore Cyber-Security Conference (SG-CRC) 2016, 2016

Modeling Modbus TCP for intrusion detection.
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016

Limiting the Impact of Stealthy Attacks on Industrial Control Systems.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

Second Workshop on Cyber-Physical Systems Security and PrivaCy (CPS-SPC'16).
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
A multi-layered and kill-chain based security analysis framework for cyber-physical systems.
Int. J. Crit. Infrastructure Prot., 2015

How the quantity and quality of training data impacts re-identification of smart meter users?
Proceedings of the 2015 IEEE International Conference on Smart Grid Communications, 2015

Detecting fraud in demand response programs.
Proceedings of the 54th IEEE Conference on Decision and Control, 2015

First Workshop on Cyber-Physical Systems Security and PrivaCy (CPS-SPC): Challenges and Research Directions.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

Incentives for demand-response programs with nonlinear, piece-wise continuous electricity cost functions.
Proceedings of the American Control Conference, 2015

Using Visual Challenges to Verify the Integrity of Security Cameras.
Proceedings of the 31st Annual Computer Security Applications Conference, 2015

2014
A Framework for Evaluating Intrusion Detection Architectures in Advanced Metering Infrastructures.
IEEE Trans. Smart Grid, 2014

Vulnerabilities of cyber-physical systems to stale data - Determining the optimal time to launch attacks.
Int. J. Crit. Infrastructure Prot., 2014

Control Systems for the Power Grid and Their Resiliency to Attacks.
IEEE Secur. Priv., 2014

Effects of Risk on Privacy Contracts for Demand-Side Management.
CoRR, 2014

Attenuating the Impact of Integrity Attacks on Real-Time Pricing in Smart Grids.
CoRR, 2014

Quantifying the Utility-Privacy Tradeoff in the Smart Grid.
CoRR, 2014

On the practicality of detecting anomalies with encrypted traffic in AMI.
Proceedings of the 2014 IEEE International Conference on Smart Grid Communications, 2014

Timing of Cyber-Physical Attacks on Process Control Systems.
Proceedings of the Critical Infrastructure Protection VIII, 2014

Is this a good time?: deciding when to launch attacks on process control systems.
Proceedings of the 3rd International Conference on High Confidence Networked Systems (part of CPS Week), 2014

From CRCs to resilient control systems: differentiating between reliability and security for the protection of cyber-physical systems.
Proceedings of the 3rd International Conference on High Confidence Networked Systems (part of CPS Week), 2014

Cyber-Physical Systems Attestation.
Proceedings of the IEEE International Conference on Distributed Computing in Sensor Systems, 2014

Privacy and customer segmentation in the smart grid.
Proceedings of the 53rd IEEE Conference on Decision and Control, 2014

Delay and sampling independence of a consensus algorithm and its application to smart grid privacy.
Proceedings of the 53rd IEEE Conference on Decision and Control, 2014

CPS: driving cyber-physical systems to unsafe operating conditions by timing DoS attacks on sensor signals.
Proceedings of the 30th Annual Computer Security Applications Conference, 2014

CPS: market analysis of attacks against demand response in the smart grid.
Proceedings of the 30th Annual Computer Security Applications Conference, 2014

2013
Depth-First Forwarding (DFF) in Unreliable Networks.
RFC, June, 2013

Big Data Analytics for Security.
IEEE Secur. Priv., 2013

Reconciling security protection and monitoring requirements in Advanced Metering Infrastructures.
Proceedings of the IEEE Fourth International Conference on Smart Grid Communications, 2013

Resilience of Process Control Systems to Cyber-Physical Attacks.
Proceedings of the Secure IT Systems - 18th Nordic Conference, 2013

Data Handling in the Smart Grid: Do We Know Enough?
Proceedings of the Critical Infrastructure Protection VII, 2013

Controllability of Dynamical Systems: Threat Models and Reactive Security.
Proceedings of the Decision and Game Theory for Security - 4th International Conference, 2013

2012
AMI threats, intrusion detection requirements and deployment recommendations.
Proceedings of the IEEE Third International Conference on Smart Grid Communications, 2012

Evaluating Electricity Theft Detectors in Smart Grid Networks.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2012

Comparison of data forwarding mechanisms for AMI networks.
Proceedings of the IEEE PES Innovative Smart Grid Technologies Conference, 2012

Fifth ACM workshop on artificial intelligence and security (AISec 2012).
Proceedings of the ACM Conference on Computer and Communications Security, 2012

A game theory model for electricity theft detection and privacy-aware control in AMI systems.
Proceedings of the 50th Annual Allerton Conference on Communication, 2012

2011
Attacks against process control systems: risk assessment, detection, and response.
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011

2010
Nudge: intermediaries' role in interdependent network security.
Proceedings of the 2010 ACM Symposium on Applied Computing (SAC), 2010

Semantic middleware for the Internet of Things.
Proceedings of the 2010 Internet of Things (IOT), IoT for a green Planet, Tokyo, Japan, November 29, 2010

2009
Evaluation of detection algorithms for MAC layer misbehavior: theory and experiments.
IEEE/ACM Trans. Netw., 2009

Understanding the physical and economic consequences of attacks on control systems.
Int. J. Crit. Infrastructure Prot., 2009

Rethinking security properties, threat models, and the design space in sensor networks: A case study in SCADA systems.
Ad Hoc Networks, 2009

Safe and Secure Networked Control Systems under Denial-of-Service Attacks.
Proceedings of the Hybrid Systems: Computation and Control, 12th International Conference, 2009

2008
Research Challenges for the Security of Control Systems.
Proceedings of the 3rd USENIX Workshop on Hot Topics in Security, 2008

Secure Control: Towards Survivable Cyber-Physical Systems.
Proceedings of the 28th IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2008 Workshops), 2008

Principled reasoning and practical applications of alert fusion in intrusion detection systems.
Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, 2008

2007
Detecting IEEE 802.11 MAC layer misbehavior in ad hoc networks: Robust strategies against individual and colluding attackers.
J. Comput. Secur., 2007

Optimal ROC Curve for a Combination of Classifiers.
Proceedings of the Advances in Neural Information Processing Systems 20, 2007

Performance Comparison of Detection Schemes for MAC Layer Misbehavior.
Proceedings of the INFOCOM 2007. 26th IEEE International Conference on Computer Communications, 2007

On Optimal Watermarking Schemes in Uncertain Gaussian Channels.
Proceedings of the International Conference on Image Processing, 2007

Towards Optimal Design of Data Hiding Algorithms Against Nonparametric Adversary Models.
Proceedings of the 41st Annual Conference on Information Sciences and Systems, 2007

2006
Design and Evaluation of Decision Making Algorithms for Information Security.
PhD thesis, 2006

A Framework for the Evaluation of Intrusion Detection Systems.
Proceedings of the 2006 IEEE Symposium on Security and Privacy (S&P 2006), 2006

Towards a secure and interoperable DRM architecture.
Proceedings of the Sixth ACM Workshop on Digital Rights Management, 2006

B-ROC Curves for the Assessment of Classifiers over Imbalanced Data Sets.
Proceedings of the Proceedings, 2006

2004
Detection and prevention of MAC layer misbehavior in ad hoc networks.
Proceedings of the 2nd ACM Workshop on Security of ad hoc and Sensor Networks, 2004

Distributed change detection for worms, DDoS and other network attacks.
Proceedings of the 2004 American Control Conference, 2004


  Loading...