Conveners
Security & Resilience in Cyber-Physical Systems
- Lilia Sava (Technical University of Moldova)
Cyber Threat Intelligence (CTI) Reports are valuable sources of information for understanding adversarial behaviors and malware functionalities. But their lack of consistency and structure can represent a challenge for security analysts in interpreting, correlating, and applying them effectively. Structuring the data in a common format, such as the MITRE ATT&CK framework, is crucial for...
Accessible public transportation remains a significant challenge for visually impaired individuals, largely due to the unreliability of conventional positioning systems like GPS in complex urban and indoor environments. This paper introduces a novel system designed to enhance the independence and safety of visually impaired users navigating public transportation facilities and vehicles. Our...
This paper presents NeuroReact, a multi-sensory system in the field of NeuroKinetics (a term we use to describe the study of neurological responses to motion-based stimuli), designed to evaluate and support neurocognitive reactions to specific stimuli (audio, visual, tactile) using embedded hardware and gamified interaction. The experimental scenarios were adapted for different recovery games,...
This paper introduces a unified testbed for evaluating the security of modern automotive networks through the integration of the CARLA driving simulator with a physical platform based on the open-source Toyota PASTA architecture. The proposed simulation environment facilitates realistic generation, manipulation, and visualization of Controller Area Network (CAN) traffic, including packet...
Mobile devices have become ubiquitous, with Apple owning more than 25% of the market. One method by which iOS ensures the security of its apps is through sandboxing. This mechanism is implemented as a set of rules compiled into binary files that lie inside the OS firmware that isolate applications within controlled environments to prevent unauthorized operations. The contents of these profiles...
This paper proposes an integrated behavioral analytics framework that leverages the usage of a centralized SIEM, edge AI processing, and automation to enable adaptive, real-time detection and response.
By collecting diverse behavioral data: API calls of applications, system commands, authentication attempts, and web request patterns, using Wazuh agents from mixed environments, the system...
Abstract—The increasing complexity and scale of cyber threats demand optimized and reproducible testing environments for security evaluations. This paper proposes a set of best practices for configuring and monitoring such environments to ensure effective and realistic vulnerability scans, penetration tests, and compliance audits. Key contributions include the use of Infrastructure as Code...