a correlation-based method fails to find these relation-
ships. Physical signals such as those used in this paper
as well as other non-functional information could be
evaluated with this method to determine if they pose a
risk as a side channel. Given the increase in complex-
ity of ICS and the ubiquity of physical sensors in ev-
eryday devices, identifying side channels like the ones
in this paper could significantly inform design and se-
curity of ICS. Future work could include the use of a
non-parametric Granger causality test (Candelon and
Tokpavi, 2016) and the use of non-hierarchical clus-
tering methods for the Granger matrix.
REFERENCES
Anderson, R. (2020). Security Engineering, (Chap. 19 ‘Side
Channels’). John Wiley & Sons, Indianapolis, IN,
USA, 3rd edition.
Babu, B., Ijyas, T., Muneer P., and Varghese, J. (2017). Se-
curity issues in scada based industrial control systems.
In 2017 2nd International Conference on Anti-Cyber
Crimes (ICACC), pages 47–51.
Cai, L. and Chen, H. (2011). TouchLogger: inferring
keystrokes on touch screen from smartphone motion.
In Proceedings of the 6th USENIX conference on Hot
topics in security, HotSec’11, page 9, USA. USENIX
Association.
Candelon, B. and Tokpavi, S. (2016). A nonparametric test
for granger causality in distribution with application to
financial contagion. Journal of Business & Economic
Statistics, 34(2):240–253.
Defays, D. (1977). An efficient algorithm for a complete
link method. The Computer Journal, 20(4):364–366.
Dickey, D. A. and Fuller, W. A. (1979). Distribution of the
estimators for autoregressive time series with a unit
root. Journal of the American Statistical Association,
74(366a):427–431.
Dorf, R. and Bishop, R. (2017). Modern Control Systems.
Pearson Pub., Harlow, England, UK, 13th edition.
Genkin, D., Shamir, A., and Tromer, E. (2014). Rsa key
extraction via low-bandwidth acoustic cryptanalysis.
In Advances in Cryptology – CRYPTO14, pages 444 –
461. Springer Berlin Heidelberg.
Granger, C. W. (1969). Investigating causal relations
by econometric models and cross-spectral methods.
Econometrica: Journal of the Econometric Society,
pages 424–438.
Griswold-Steiner, I., LeFevre, Z., and Serwadda, A.
(2021). Smartphone speech privacy concerns from
side-channel attacks on facial biomechanics. Comput-
ers & Security, 100:102110.
Hojjati, A., Adhikari, A., Struckmann, K., Chou, E.,
Tho Nguyen, T. N., Madan, K., Winslett, M. S.,
Gunter, C. A., and King, W. P. (2016). Leave Your
Phone at the Door: Side Channels that Reveal Fac-
tory Floor Secrets. In Proceedings of the 2016 ACM
SIGSAC Conference on Computer and Communica-
tions Security, CCS ’16, pages 883–894, New York,
NY, USA. Association for Computing Machinery.
Ibing, A. (2012). On side channel cryptanalysis and sequen-
tial decoding.
Javed, A. R., Beg, M. O., Asim, M., Baker, T., and
Al-Bayatti, A. H. (2020). AlphaLogger: detecting
motion-based side-channel attack using smartphone
keystrokes. J Ambient Intell Human Comput.
Kocher, P., Horn, J., Fogh, A., , Genkin, D., Gruss, D., Haas,
W., Hamburg, M., Lipp, M., Mangard, S., Prescher,
T., Schwarz, M., and Yarom, Y. (2019). Spectre at-
tacks: Exploiting speculative execution. In 40th IEEE
Symposium on Security and Privacy (S&P’19).
Lipp, M., Schwarz, M., Gruss, D., Prescher, T., Haas, W.,
Fogh, A., Horn, J., Mangard, S., Kocher, P., Genkin,
D., Yarom, Y., and Hamburg, M. (2018). Meltdown:
Reading kernel memory from user space. In 27th
USENIX Security Symposium (USENIX Security 18).
McLaughlin, S., Konstantinou, C., Wang, X., Davi, L.,
Sadeghi, A., Maniatakos, M., and Karri, R. (2016).
The cybersecurity landscape in industrial control sys-
tems. Proceedings of the IEEE, 104(5):1039–1057.
Pliatsios, D., Sarigiannidis, P., Lagkas, T., and Sarigianni-
dis, A. G. (2020). A survey on scada systems: Secure
protocols, incidents, threats and tactics. IEEE Com-
munications Surveys Tutorials, 22(3):1942–1976.
Quisquater, J.-J. and Samdye, D. (2001). Electromagnetic
analysis (EMA): Measures and counter-measures for
smart cards. In Smart Card Programming and Secu-
rity (E-smart), pages 200 – 210.
Quisquater, J.-J. and Samdye, D. (2002). Side channel
cryptanalysis. In SEcurit
´
e des Communications sur
Internet – SECI02, pages 179 – 184.
Sinha, A., Taylor, M., Srirama, N., Manikas, T., Larson,
E. C., and Thornton, M. H. (2021). Industrial control
system anomaly detection using convolutional neural
network consensus. 2021 IEEE Conference on Con-
trol Technology and Applications (CCTA).
Stellios, I., Kotzanikolaou, P., Psarakis, M., Alcaraz, C.,
and Lopez, J. (2018). A survey of iot-enabled cyberat-
tacks: Assessing attack paths to critical infrastructures
and services. IEEE Communications Surveys Tutori-
als, 20(4):3453–3495.
ICISSP 2022 - 8th International Conference on Information Systems Security and Privacy
298