Saman A. Zonouz

Orcid: 0000-0001-9047-4047

Affiliations:
  • Rutgers University, Department of Electrical and Computer Engineering, Piscataway, NJ, USA
  • University of Illinois at Urbana-Champaign, Urbana, IL, USA (PhD 2011)


According to our database1, Saman A. Zonouz authored at least 119 papers between 2008 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Toward Resilient Modern Power Systems: From Single-Domain to Cross-Domain Resilience Enhancement.
Proc. IEEE, April, 2024

Virtual Keymysteries Unveiled: Detecting Keystrokes in VR with External Side-Channels.
Proceedings of the IEEE Security and Privacy, 2024

Compromising Industrial Processes using Web-Based Programmable Logic Controller Malware.
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024

Control Corruption without Firmware Infection: Stealthy Supply Chain Attacks via PLC Hardware Implants (MalTag).
Proceedings of the 15th ACM/IEEE International Conference on Cyber-Physical Systems, 2024

Physics-Assisted Explainable Anomaly Detection in Power Systems.
Proceedings of the ECAI 2024 - 27th European Conference on Artificial Intelligence, 19-24 October 2024, Santiago de Compostela, Spain, 2024

2023
DeepContext: Mobile Context Modeling and Prediction via HMMs and Deep Learning.
IEEE Trans. Mob. Comput., December, 2023

Dissecting the Industrial Control Systems Software Supply Chain.
IEEE Secur. Priv., 2023

Bridging Both Worlds in Semantics and Time: Domain Knowledge Based Analysis and Correlation of Industrial Process.
CoRR, 2023

Why Don't You Clean Your Glasses? Perception Attacks with Dynamic Optical Perturbations.
CoRR, 2023

GraphMP: Graph Neural Network-based Motion Planning with Efficient Graph Search.
Proceedings of the Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, 2023

Resource-Aware DNN Partitioning for Privacy-Sensitive Edge-Cloud Systems.
Proceedings of the Neural Information Processing - 30th International Conference, 2023

Get Your Cyber-Physical Tests Done! Data-Driven Vulnerability Assessment of Robotic Aerial Vehicles.
Proceedings of the 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Network, 2023

CSTAR: Towards Compact and Structured Deep Neural Networks with Adversarial Robustness.
Proceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence, 2023

2022
Cyber-Physical Dataset for MiTM attacks in Power Systems.
Dataset, May, 2022

Cyber-physical dataset of hardware-in-the-loop cyber-physical power systems testbed under MiTM attacks.
Dataset, May, 2022

Don't Just BYOD, Bring-Your-Own-App Too! Protection via Virtual Micro Security Perimeters.
IEEE Trans. Mob. Comput., 2022

Generalized Contingency Analysis Based on Graph Theory and Line Outage Distribution Factor.
IEEE Syst. J., 2022

Let's Talk Through Physics! Covert Cyber-Physical Data Exfiltration on Air-Gapped Edge Devices.
CoRR, 2022

Fed2KD: Heterogeneous Federated Learning for Pandemic Risk Assessment via Two-Way Knowledge Distillation.
Proceedings of the 17th Wireless On-Demand Network Systems and Services Conference, 2022

Hiding in Plain Sight? On the Efficacy of Power Side Channel-Based Control Flow Monitoring.
Proceedings of the 31st USENIX Security Symposium, 2022

OpenConduit: A Tool for Recreating Power System Communication Networks Automatically.
Proceedings of the IEEE International Conference on Communications, 2022

Hiding My Real Self! Protecting Intellectual Property in Additive Manufacturing Systems Against Optical Side-Channel Attacks.
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022

Reverse engineering and retrofitting robotic aerial vehicle control firmware using dispatch.
Proceedings of the MobiSys '22: The 20th Annual International Conference on Mobile Systems, Applications and Services, Portland, Oregon, 27 June 2022, 2022

Robot Motion Planning as Video Prediction: A Spatio-Temporal Neural Network-based Motion Planner.
Proceedings of the IEEE/RSJ International Conference on Intelligent Robots and Systems, 2022

Guide-Guard: Off-Target Predicting in CRISPR Applications.
Proceedings of the Intelligent Data Engineering and Automated Learning - IDEAL 2022, 2022

LegoNet: Memory Footprint Reduction Through Block Weight Clustering.
Proceedings of the IEEE Intl. Conf. on Dependable, 2022

2021
CollabLoc: Privacy-Preserving Multi-Modal Collaborative Mobile Phone Localization.
IEEE Trans. Mob. Comput., 2021

Man-in-the-middle attacks and defence in a power system cyber-physical testbed.
IET Cyper-Phys. Syst.: Theory & Appl., 2021

Cyber-physical component ranking for risk sensitivity analysis using betweenness centrality.
IET Cyper-Phys. Syst.: Theory & Appl., 2021

Design and evaluation of a cyber-physical testbed for improving attack resilience of power systems.
IET Cyper-Phys. Syst.: Theory & Appl., 2021

Strategy for distributed controller defence: Leveraging controller roles and control support groups to maintain or regain control in cyber-adversarial power systems.
IET Cyper-Phys. Syst.: Theory & Appl., 2021

Man-in-The-Middle Attacks and Defense in a Power System Cyber-Physical Testbed.
CoRR, 2021

Multi-Source Data Fusion for Cyberattack Detection in Power Systems.
CoRR, 2021

Multi-Source Multi-Domain Data Fusion for Cyberattack Detection in Power Systems.
IEEE Access, 2021

Mini-Me, You Complete Me! Data-Driven Drone Security via DNN-based Approximate Computing.
Proceedings of the RAID '21: 24th International Symposium on Research in Attacks, 2021

CHIP: CHannel Independence-based Pruning for Compact Neural Networks.
Proceedings of the Advances in Neural Information Processing Systems 34: Annual Conference on Neural Information Processing Systems 2021, 2021

A Practical Side-Channel Based Intrusion Detection System for Additive Manufacturing Systems.
Proceedings of the 41st IEEE International Conference on Distributed Computing Systems, 2021

Physics-Aware Security Monitoring against Structural Integrity Attacks in 3D Printers.
Proceedings of the 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2021

Physical Logic Bombs in 3D Printers via Emerging 4D Techniques.
Proceedings of the ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6, 2021

2020
Design and Evaluation of A Cyber-Physical Resilient Power System Testbed.
CoRR, 2020

On-board Deep-learning-based Unmanned Aerial Vehicle Fault Cause Detection and Identification.
Proceedings of the 2020 IEEE International Conference on Robotics and Automation, 2020

Control Behavior Integrity for Distributed Cyber-Physical Systems.
Proceedings of the 11th ACM/IEEE International Conference on Cyber-Physical Systems, 2020

Hybrid Firmware Analysis for Known Mobile and IoT Security Vulnerabilities.
Proceedings of the 50th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2020

2019
Cyber-Physical Resilience: Definition and Assessment Metric.
IEEE Trans. Smart Grid, 2019

Contactless Monitoring of Critical Infrastructure [From the Guest Editors].
IEEE Signal Process. Mag., 2019

Side-Channel-Based Code-Execution Monitoring Systems: A Survey.
IEEE Signal Process. Mag., 2019

Selfie: User-defined Sensitive Memory Protection and Recovery.
CoRR, 2019

Secure Mobile Technologies for Proactive Critical Infrastructure Situational Awareness.
CoRR, 2019

SCORE: A Security-Oriented Cyber-Physical Optimal Response Engine.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

PAtt: Physics-based Attestation of Control Systems.
Proceedings of the 22nd International Symposium on Research in Attacks, 2019

HCFContext: Smartphone Context Inference via Sequential History-based Collaborative Filtering.
Proceedings of the 2019 IEEE International Conference on Pervasive Computing and Communications, 2019

A Cyber Topology Model for the Texas 2000 Synthetic Electric Power Grid.
Proceedings of the 2019 Principles, Systems and Applications of IP Telecommunications, 2019

Tell Me More Than Just Assembly! Reversing Cyber-Physical Execution Semantics of Embedded IoT Controller Software Binaries.
Proceedings of the 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2019

2018
Enhancing Microgrid Resiliency Against Cyber Vulnerabilities.
Proceedings of the IEEE Industry Applications Society Annual Meeting, 2018

Algorithmic Attack Synthesis Using Hybrid Dynamics of Power Grid Critical Infrastructures.
Proceedings of the 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2018

Use-After-Free Mitigation via Protected Heap Allocation.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2018

Dynamic Memory Protection via Intel SGX-Supported Heap Allocation.
Proceedings of the 2018 IEEE 16th Intl Conf on Dependable, 2018

Crystal (ball): I Look at Physics and Predict Control Flow! Just-Ahead-Of-Time Controller Recovery.
Proceedings of the 34th Annual Computer Security Applications Conference, 2018

2017
Guest Editorial Smart Grid Cyber-Physical Security.
IEEE Trans. Smart Grid, 2017

RESeED: A secure regular-expression search tool for storage clouds.
Softw. Pract. Exp., 2017

Analytic corrective control selection for online remedial action scheme design in a cyber adversarial environment.
IET Cyper-Phys. Syst.: Theory & Appl., 2017

See No Evil, Hear No Evil, Feel No Evil, Print No Evil? Malicious Fill Patterns Detection in Additive Manufacturing.
Proceedings of the 26th USENIX Security Symposium, 2017

Power grid safety control via fine-grained multi-persona programmable logic controllers.
Proceedings of the 2017 IEEE International Conference on Smart Grid Communications, 2017

Cyber-air-gapped detection of controller attacks through physical interdependencies.
Proceedings of the 2017 IEEE International Conference on Smart Grid Communications, 2017

Argus: Smartphone-enabled human cooperation for disaster situational awareness via MARL.
Proceedings of the 2017 IEEE International Conference on Pervasive Computing and Communications Workshops, 2017

Hey, My Malware Knows Physics! Attacking PLCs with Physical Model Aware Rootkit.
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017

CollabLoc: Privacy-Preserving Multi-Modal Localization via Collaborative Information Fusion.
Proceedings of the 26th International Conference on Computer Communication and Networks, 2017

Compromising Security of Economic Dispatch in Power System Operations.
Proceedings of the 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2017

Watch Me, but Don't Touch Me! Contactless Control Flow Monitoring via Electromagnetic Emanations.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

2016
Cyber-Physical models for power grid security analysis: 8-substation case.
Proceedings of the 2016 IEEE International Conference on Smart Grid Communications, 2016

Augmented DC power flow method with real-time measurements.
Proceedings of the Power Systems Computation Conference, 2016

Argus: Smartphone-Enabled Human Cooperation via Multi-agent Reinforcement Learning for Disaster Situational Awareness.
Proceedings of the 2016 IEEE International Conference on Autonomic Computing, 2016

BioMEMS-based coding for secure medical diagnostic devices.
Proceedings of the 38th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2016

Don't Just BYOD, Bring-Your-Own-App Too! Protection via Virtual Micro Security Perimeters.
Proceedings of the 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2016

Secure Point-of-Care Medical Diagnostics via Trusted Sensing and Cyto-Coded Passwords.
Proceedings of the 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2016

Trace-free memory data structure forensics via past inference and future speculations.
Proceedings of the 32nd Annual Conference on Computer Security Applications, 2016

CPAC: securing critical infrastructure with cyber-physical access control.
Proceedings of the 32nd Annual Conference on Computer Security Applications, 2016

2015
CPIndex: Cyber-Physical Vulnerability Assessment for Power-Grid Infrastructures.
IEEE Trans. Smart Grid, 2015

Empirical Development of a Trusted Sensing Base for Power System Infrastructures.
IEEE Trans. Smart Grid, 2015

A Cyber-Physical Modeling and Assessment Framework for Power Grid Infrastructures.
IEEE Trans. Smart Grid, 2015

Seclius: An Information Flow-Based, Consequence-Centric Security Metric.
IEEE Trans. Parallel Distributed Syst., 2015

CloudID: Trustworthy cloud-based and cross-enterprise biometric identification.
Expert Syst. Appl., 2015

PLCloud: Comprehensive power grid PLC security monitoring with zero safety disruption.
Proceedings of the 2015 IEEE International Conference on Smart Grid Communications, 2015

Towards cyber-physical intrusion tolerance.
Proceedings of the 2015 IEEE International Conference on Smart Grid Communications, 2015

TSC: Trustworthy and Scalable Cytometry.
Proceedings of the 17th IEEE International Conference on High Performance Computing and Communications, 2015

Towards resilient cyber-physical control systems.
Proceedings of the 2015 IEEE Global Conference on Signal and Information Processing, 2015

2014
SOCCA: A Security-Oriented Cyber-Physical Contingency Analysis in Power Infrastructures.
IEEE Trans. Smart Grid, 2014

RRE: A Game-Theoretic Intrusion Response and Recovery Engine.
IEEE Trans. Parallel Distributed Syst., 2014

An Analysis of DoS Attack Strategies Against the LTE RAN.
J. Cyber Secur. Mobil., 2014

Detecting Industrial Control Malware Using Automated PLC Code Analytics.
IEEE Secur. Priv., 2014

Controller-aware false data injection against programmable logic controllers.
Proceedings of the 2014 IEEE International Conference on Smart Grid Communications, 2014

TMQ: Threat model quantification in Smart Grid critical infrastructures.
Proceedings of the 2014 IEEE International Conference on Smart Grid Communications, 2014

Covert channel communication through physical interdependencies in cyber-physical infrastructures.
Proceedings of the 2014 IEEE International Conference on Smart Grid Communications, 2014

A Trusted Safety Verifier for Process Controller Code.
Proceedings of the 21st Annual Network and Distributed System Security Symposium, 2014

Security challenges in building automation and SCADA.
Proceedings of the International Carnahan Conference on Security Technology, 2014

RESeED: A Tool for Regular Expression Search over Encrypted Data in Cloud Storage.
Proceedings of the 14th IEEE/ACM International Symposium on Cluster, 2014

TroGuard: context-aware protection against web-based socially engineered trojans.
Proceedings of the 30th Annual Computer Security Applications Conference, 2014

RESeED: Regular Expression Search over Encrypted Data in the Cloud.
Proceedings of the 2014 IEEE 7th International Conference on Cloud Computing, Anchorage, AK, USA, June 27, 2014

2013
A Multi-Sensor Energy Theft Detection Framework for Advanced Metering Infrastructures.
IEEE J. Sel. Areas Commun., 2013

Secloud: A cloud-based comprehensive and lightweight security solution for smartphones.
Comput. Secur., 2013

Cyber-physical security metric inference in smart grid critical infrastructures based on system administrators' responsive behavior.
Comput. Secur., 2013

SECPSIM: A Training Simulator for cyber-power infrastructure security.
Proceedings of the IEEE Fourth International Conference on Smart Grid Communications, 2013

TSB: Trusted sensing base for the power grid.
Proceedings of the IEEE Fourth International Conference on Smart Grid Communications, 2013

FloTracker: Log-Free and Instantaneous Host-Based Intrusion Root-Cause Analysis.
Proceedings of the IEEE 19th Pacific Rim International Symposium on Dependable Computing, 2013

Sechduler: A Security-Aware Kernel Scheduler.
Proceedings of the IEEE 19th Pacific Rim International Symposium on Dependable Computing, 2013

Dragonfruit: Cloud Provider-Agnostic Trustworthy Cloud Data Storage and Remote Processing.
Proceedings of the IEEE 19th Pacific Rim International Symposium on Dependable Computing, 2013

Sechduler: a security-aware kernel scheduler.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

Identification Using Encrypted Biometrics.
Proceedings of the Computer Analysis of Images and Patterns, 2013

2012
SCPSE: Security-Oriented Cyber-Physical State Estimation for Power Grid Critical Infrastructures.
IEEE Trans. Smart Grid, 2012

AMIDS: A multi-sensor energy theft detection framework for advanced metering infrastructures.
Proceedings of the IEEE Third International Conference on Smart Grid Communications, 2012

A Fuzzy Markov Model for scalable reliability analysis of Advanced Metering Infrastructure.
Proceedings of the IEEE PES Innovative Smart Grid Technologies Conference, 2012

EliMet: Security metric elicitation in power grid critical infrastructures by observing system administrators' responsive behavior.
Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks, 2012

Towards incorporating human intelligence into online security solutions.
Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2012

2011
Game-theoretic intrusion response and recovery
PhD thesis, 2011

FloGuard: Cost-Aware Systemwide Intrusion Defense via Online Forensics and On-Demand IDS Deployment.
Proceedings of the Computer Safety, Reliability, and Security, 2011

Managing business health in the presence of malicious attacks.
Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks Workshops (DSN-W 2011), 2011

A cloud-based intrusion detection and response system for mobile phones.
Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks Workshops (DSN-W 2011), 2011

2010
Cost-aware systemwide intrusion defense via online forensics and on-demand detector deployment.
Proceedings of the 3rd ACM Workshop on Assurable and Usable Security Configuration, 2010

2008
A Kalman-Based Coordination for Hierarchical State Estimation: Agorithm and Analysis.
Proceedings of the 41st Hawaii International International Conference on Systems Science (HICSS-41 2008), 2008


  Loading...