diff options
-rw-r--r-- | paper/Makefile | 21 | ||||
-rw-r--r-- | paper/chip_duration_sensitivity_6.pdf | bin | 0 -> 23972 bytes | |||
-rw-r--r-- | paper/dsss_gold_nbits_overview.pdf | bin | 0 -> 14557 bytes | |||
-rw-r--r-- | paper/dsss_thf_amplitude_5678.pdf | bin | 0 -> 43303 bytes | |||
-rw-r--r-- | paper/freq_meas_spectrum_new.pdf | bin | 0 -> 121518 bytes | |||
-rw-r--r-- | paper/safety-reset-paper.tex | 33 |
6 files changed, 29 insertions, 25 deletions
diff --git a/paper/Makefile b/paper/Makefile index ac1edbb..6802dce 100644 --- a/paper/Makefile +++ b/paper/Makefile @@ -30,6 +30,27 @@ version.tex: ${main_tex}.tex safety-reset-paper.bib resources/%.pdf: $(LAB_PATH)/%.ipynb jupyter-nbconvert --to=pdf --output-dir=resources --output=$* --LatexExporter.template_file=resources/nbexport.tplx $^ +.PHONY: submission +submission: acsac22-15.zip + +acsac22-15.zip: clean + rm -f acsac22-15.zip + mkdir -p submission/pdf + mkdir -p submission/Source + cd submission + cp ../safety-reset-paper.pdf pdf/ + cp ../safety-reset-paper.tex Source/ + cp ../safety-reset-paper.bib Source/ACSAC22-15.bib + cp ../flowchart.pdf Source/ + cp ../freq_meas_spectrum_new.pdf Source/ + cp ../dsss_gold_nbits_overview.pdf Source/ + cp ../dsss_thf_amplitude_5678.pdf Source/ + cp ../chip_duration_sensitivity_6.pdf Source/ + cp ../prototype.jpg Source/ + cp ../prototype_schema.pdf Source/ + zip -r ../acsac22-15.zip * + + .PHONY: clean clean: rm -f ${main_tex}.aux ${main_tex}.bbl ${main_tex}.bcf ${main_tex}.log ${main_tex}.blg diff --git a/paper/chip_duration_sensitivity_6.pdf b/paper/chip_duration_sensitivity_6.pdf Binary files differnew file mode 100644 index 0000000..e78f90f --- /dev/null +++ b/paper/chip_duration_sensitivity_6.pdf diff --git a/paper/dsss_gold_nbits_overview.pdf b/paper/dsss_gold_nbits_overview.pdf Binary files differnew file mode 100644 index 0000000..3690ad8 --- /dev/null +++ b/paper/dsss_gold_nbits_overview.pdf diff --git a/paper/dsss_thf_amplitude_5678.pdf b/paper/dsss_thf_amplitude_5678.pdf Binary files differnew file mode 100644 index 0000000..debf028 --- /dev/null +++ b/paper/dsss_thf_amplitude_5678.pdf diff --git a/paper/freq_meas_spectrum_new.pdf b/paper/freq_meas_spectrum_new.pdf Binary files differnew file mode 100644 index 0000000..874f027 --- /dev/null +++ b/paper/freq_meas_spectrum_new.pdf diff --git a/paper/safety-reset-paper.tex b/paper/safety-reset-paper.tex index f4e4633..4015f46 100644 --- a/paper/safety-reset-paper.tex +++ b/paper/safety-reset-paper.tex @@ -16,9 +16,6 @@ % https://eepublicdownloads.entsoe.eu/clean-documents/pre2015/publications/entsoe/Operation_Handbook/Policy_1_Appendix%20_final.pdf -%\keywords{Security, privacy and resilience in critical infrastructures \and Security and privacy in ``internet of -%things'' \and Cyber-physical systems \and Hardware security \and Network Security \and Energy systems \and Signal theory} - \copyrightyear{2022} \acmYear{2022} \setcopyright{rightsretained} @@ -40,6 +37,8 @@ Conference}{December 5--9}{Austin, TX, USA} \affiliation{ \institution{Technische Universität Darmstadt} \city{Darmstadt} + cp ../safety-reset-paper.pdf pdf/ + cp ../safety-reset-paper.pdf pdf/ \country{Germany} } \email{research@jaseg.de} @@ -89,29 +88,15 @@ Conference}{December 5--9}{Austin, TX, USA} <concept_significance>300</concept_significance> </concept> <concept> -<concept_id>10002978.10002997.10002998</concept_id> -<concept_desc>Security and privacy~Malware and its mitigation</concept_desc> -<concept_significance>300</concept_significance> -</concept> -<concept> <concept_id>10002978.10003001.10003003</concept_id> <concept_desc>Security and privacy~Embedded systems security</concept_desc> <concept_significance>500</concept_significance> </concept> -<concept> -<concept_id>10002978.10003001.10003599.10011621</concept_id> -<concept_desc>Security and privacy~Hardware-based security protocols</concept_desc> -<concept_significance>300</concept_significance> -</concept> </ccs2012> \end{CCSXML} -\ccsdesc[500]{Hardware~Power networks} -\ccsdesc[300]{Hardware~Smart grid} -\ccsdesc[500]{Hardware~Safety critical systems} -\ccsdesc[300]{Security and privacy~Malware and its mitigation} -\ccsdesc[500]{Security and privacy~Embedded systems security} -\ccsdesc[300]{Security and privacy~Hardware-based security protocols} +\keywords{Grid Frequency Modulation, Direct Sequence Spread Spectrum, Incident Response, Cyber-Physical Systems, Power +Networks, Smart Grid, Embedded Systems Security} \begin{abstract} The growing heterogenous ecosystem of networked consumer devices such as smart meters or IoT-connected appliances @@ -556,7 +541,7 @@ measurement literature~\cite{borkowski01}. \begin{figure} \centering - \includegraphics[width=0.45\textwidth]{../notebooks/fig_out/freq_meas_spectrum_new} + \includegraphics[width=0.45\textwidth]{freq_meas_spectrum_new} \caption{The spectrum of grid frequency variations measured over 24 hours. The raw spectrum is shown in gray, and a smoothed spectrum is shown in red. The blue line is inversely proportional to frequency and illustrates the $1/f$ nature of the spectrum. Distinctive peaks in the spectrum are marked with red crosses, and their locations @@ -706,7 +691,7 @@ durations move our signals' bandwidth into the lower-noise region from $\SI{0.2} \begin{figure} \centering - \includegraphics[width=0.3\textwidth]{../notebooks/fig_out/dsss_gold_nbits_overview} + \includegraphics[width=0.3\textwidth]{dsss_gold_nbits_overview} \caption{Symbol Error Rate as a function of modulation amplitude for Gold sequences of several lengths.} \Description{A plot of symbol error rate versus amplitude in millihertz. The plot shows four lines, one each for 5 bit, 6 bit, 7 bit and 8 bit. All four lines form smooth step functions, plateauing at a symbol error rate of 1.0 for @@ -721,8 +706,7 @@ durations move our signals' bandwidth into the lower-noise region from $\SI{0.2} \begin{figure} \centering - \hspace*{-5mm}\includegraphics[width=0.5\textwidth]{../notebooks/fig_out/dsss_thf_amplitude_5678} - \vspace*{-5mm} + \hspace*{-5mm}\includegraphics[width=0.45\textwidth]{dsss_thf_amplitude_5678} \caption{SER vs.\ Amplitude and detection threshold. Detection threshold is set as a factor of background noise level.} \Description{This figure shows four plots that are similar to the previous figure. Each plot shows symbol error rate @@ -743,8 +727,7 @@ durations move our signals' bandwidth into the lower-noise region from $\SI{0.2} \begin{figure} \centering - \hspace*{-5mm}\includegraphics[width=0.5\textwidth]{../notebooks/fig_out/chip_duration_sensitivity_6} - \vspace*{-5mm} + \hspace*{-5mm}\includegraphics[width=0.45\textwidth]{chip_duration_sensitivity_6} \caption{SER vs.\ DSSS chip duration.} \Description{The figure shows two plots. The first plot shows symbol error rate against signal amplitude in millihertz, but this time it shows a cohort of curves for different chip durations. The general amplitude behavior |