{"title":"SIMPLE: A Remote Attestation Approach for Resource-constrained IoT devices","authors":"M. Ammar, B. Crispo, G. Tsudik","doi":"10.1109/ICCPS48487.2020.00036","DOIUrl":"https://doi.org/10.1109/ICCPS48487.2020.00036","url":null,"abstract":"Remote Attestation (RA) is a security service that detects malware presence on remote IoT devices by verifying their software integrity by a trusted party (verifier). There are three main types of RA: software (SW)-, hardware (HW)-, and hybrid (SW/HW)-based. Hybrid techniques obtain secure RA with minimal hardware requirements imposed on the architectures of existing microcontrollers units (MCUs). In recent years, considerable attention has been devoted to hybrid techniques since prior software-based ones lack concrete security guarantees in a remote setting, while hardware-based approaches are too costly for low-end MCUs. However, one key problem is that many already deployed IoT devices neither satisfy minimal hardware requirements nor support hardware modifications, needed for hybrid RA.This paper bridges the gap between software-based and hybrid RA by proposing a novel RA scheme based on software virtualization. In particular, it proposes a new scheme, called SIMPLE, which meets the minimal hardware requirements needed for secure RA via reliable software. SIMPLE depends on a formally-verified software-based memory isolation technique, called Security MicroVisor (Sμ V). Its reliability is achieved by extending the formally-verified safety and correctness properties to cover the entire software architecture of SIMPLE. Furthermore, SIMPLE is used to construct SIMPLE+, an efficient swarm attestation scheme for static and dynamic heterogeneous IoT networks. We implement and evaluate SIMPLE and SIMPLE+ on Atmel AVR architecture, a common MCU platform.","PeriodicalId":158690,"journal":{"name":"2020 ACM/IEEE 11th International Conference on Cyber-Physical Systems (ICCPS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129702041","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Control Reconfiguration of Cyber-physical Systems for Improved Performance via Reverse-engineering and Accelerated First-order Algorithms","authors":"H. Shu, Xuan Zhang, Na Li, A. Papachristodoulou","doi":"10.1109/ICCPS48487.2020.00034","DOIUrl":"https://doi.org/10.1109/ICCPS48487.2020.00034","url":null,"abstract":"This paper presents a control reconfiguration approach to improve the performance of a certain class of dynamical systems. Motivated by recent research on re-engineering cyber-physical systems, we propose a three-step control retrofit procedure. Firstly, we reverse-engineer a dynamical system as a gradient descent algorithm to solve an unconstrained convex optimization problem. Secondly, we apply a heavy ball method or an accelerated gradient descent algorithm with constant coefficients to solve this optimization problem. Finally, by com-paring the original and accelerated dynamics, we obtain the implementation of the redesigned part (i.e., the extra dynamics). As a result, the convergence rate/speed of the given system can be improved, while the system structure remains. Three practical applications, including consensus in multi-agent systems, Internet congestion control and temperature control in buildings, show the effectiveness of the proposed redesign approach.","PeriodicalId":158690,"journal":{"name":"2020 ACM/IEEE 11th International Conference on Cyber-Physical Systems (ICCPS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130146336","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Game-Theoretic Approach to Secure Estimation and Control for Cyber-Physical Systems with a Digital Twin","authors":"Zhiheng Xu, A. Easwaran","doi":"10.1109/ICCPS48487.2020.00010","DOIUrl":"https://doi.org/10.1109/ICCPS48487.2020.00010","url":null,"abstract":"Cyber-Physical Systems (CPSs) play an increasingly significant role in many critical applications. These valuable applications attract various sophisticated attacks. This paper considers a stealthy estimation attack, which aims to modify the state estimation of the CPSs. The intelligent attackers can learn defense strategies and use clandestine attack strategies to avoid detection. To address the issue, we design a Chi-square detector in a Digital Twin (DT), which is an online digital model of the physical system. We use a Signaling Game with Evidence (SGE) to find the optimal attack and defense strategies. Our analytical results show that the proposed defense strategies can mitigate the impact of the attack on the physical estimation and guarantee the stability of the CPSs. Finally, we use an illustrative application to evaluate the performance of the proposed framework.","PeriodicalId":158690,"journal":{"name":"2020 ACM/IEEE 11th International Conference on Cyber-Physical Systems (ICCPS)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116130869","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Formalizing traffic rules for uncontrolled intersections","authors":"Abolfazl Karimi, Parasara Sridhar Duggirala","doi":"10.1109/ICCPS48487.2020.00012","DOIUrl":"https://doi.org/10.1109/ICCPS48487.2020.00012","url":null,"abstract":"One of the challenges in designing autonomous vehicles (AV’s) is driving around humans (i.e. drivers, cyclists, pedestrians, etc.) In particular, the AV’s and the humans must have a common set of traffic rules to follow. In this paper, we present a new approach to formalize and implement traffic rules. We use California’s DMV driver handbook as a working example. Our approach provides a straightforward mapping from the rules in the handbook to its formal model, and from the model to its implementation. To demonstrate the efficiency of this approach, we formally model the traffic rules in the logic programming paradigm of Answer Set Programming (ASP) using a programming language called Clingo. We then integrate these rules into CARLA, a virtual test bed environment for autonomous vehicles. We simulate the behavior of autonomous vehicles at four way and three way uncontrolled intersections by correct reasoning of right-of-way rules for autonomous vehicles in real time. As a result, the behaviors of autonomous vehicles under our controller are more realistic compared to CARLA’s default FIFO controller. This also improves the throughput of the traffic through the intersection.","PeriodicalId":158690,"journal":{"name":"2020 ACM/IEEE 11th International Conference on Cyber-Physical Systems (ICCPS)","volume":"143 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122552878","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Kurian Polachan, Belma Turkovic, Prabhakar T. Venkata, C. Singh, F. Kuipers
{"title":"Dynamic Network Slicing for the Tactile Internet","authors":"Kurian Polachan, Belma Turkovic, Prabhakar T. Venkata, C. Singh, F. Kuipers","doi":"10.1109/ICCPS48487.2020.00020","DOIUrl":"https://doi.org/10.1109/ICCPS48487.2020.00020","url":null,"abstract":"Tactile internet\" refers to a network that can support real-time interactions between human operators and remote cyber-physical systems as if they were near to each other. For this, the network should support ultra-low latency communication, often referred to as the 1ms challenge. However, we observe that network requirements, such as latency and bandwidth, of tactile internet based cyber-physical systems or Tactile Cyber-Physical Systems (TCPS) are not static: they severely fluctuate over time. Therefore, for TCPS, static provisioning of network resources is sub-optimal. For optimal utilization of network resources, we propose a mechanism to, per TCPS flow, dynamically create, destroy and switch network slices, based on the network resources needed at that time. Our solution consists of two main components. First, we develop a clustering algorithm to determine the slices and their specifications required to support a TCPS flow. Second, we leverage Software-Defined Networking (SDN) and P4-programmable switches to enable on- the-fly provisioning and switching of these slices.","PeriodicalId":158690,"journal":{"name":"2020 ACM/IEEE 11th International Conference on Cyber-Physical Systems (ICCPS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129946082","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Contextually-aware Fetal Sensing in Transabdominal Fetal Pulse Oximetry","authors":"Daniel D. Fong, Kourosh Vali, S. Ghiasi","doi":"10.1109/ICCPS48487.2020.00019","DOIUrl":"https://doi.org/10.1109/ICCPS48487.2020.00019","url":null,"abstract":"Transabdominal fetal pulse oximetry (TFO) is a noninvasive technique that can provide physicians with a convenient measure of fetal oxygen saturation. This is accomplished by sending a known light intensity signal towards the mother’s abdomen, where it is modified by the maternal and fetal tissues, and observed some distance away. The measured signal, captured by a photodetector, contains a mixture of both maternal and fetal information, where the fetal portion must be extracted to calculate the fetal oxygen saturation. However, the ability to decouple the maternal and fetal components is highly dependent on the physiological and structural parameters of the physical system, making it difficult to robustly extract the fetal signal across patients over a long-period of time. In this work, we propose a contextually-aware sensing approach that utilizes additional information about the physical system (physiological, spatial, and temporal) to extract the fetal signal. It does this by using easily-measurable parameters of the mother’s physiology to reduce the maternal impact, incorporating data fusion techniques to combine spatial information from multiple detectors, and utilizing historical data points to improve and validate the fetal signal estimates. The efficacy of the proposed approach is supported by experimental evaluation using in vivo measurements captured on pregnant sheep.","PeriodicalId":158690,"journal":{"name":"2020 ACM/IEEE 11th International Conference on Cyber-Physical Systems (ICCPS)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117013293","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On-Line Supervisory Control for Surveillance under Partial Observation with scLTL Specifications","authors":"Ami Sakakibara, T. Ushio","doi":"10.1109/ICCPS48487.2020.00028","DOIUrl":"https://doi.org/10.1109/ICCPS48487.2020.00028","url":null,"abstract":"Linear temporal logic (LTL) [1] is a formal language with rich expressibility and provides a formal description of complex task specifications for robots. In a surveillance problem, for example, mobile robots move around the target environment and collect data with attached sensors. In this abstract, we consider a control problem of a mobile robot working for a surveillance mission. We apply supervisory control to enforce the high-level behavior of the robot defined in an abstracted model [2] to satisfy a given syntactically cosafe LTL (scLTL) specification [3] . We extend the method proposed in [4] to the case under partial observation.","PeriodicalId":158690,"journal":{"name":"2020 ACM/IEEE 11th International Conference on Cyber-Physical Systems (ICCPS)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125112232","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Sina Faezi, Sujit Rokka Chhetri, A. Malawade, J. Chaput, William H. Grover, P. Brisk, M. A. Faruque
{"title":"Acoustic Side Channel Attack Against DNA Synthesis Machines: Poster Abstract","authors":"Sina Faezi, Sujit Rokka Chhetri, A. Malawade, J. Chaput, William H. Grover, P. Brisk, M. A. Faruque","doi":"10.1109/ICCPS48487.2020.00026","DOIUrl":"https://doi.org/10.1109/ICCPS48487.2020.00026","url":null,"abstract":"Synthetic DNA molecules play an essential role in genomics research and are a promising, high-capacity data storage medium. Currently, researchers use automated DNA synthesizers to custom-build sequences of oligonucleotides (short DNA strands) using the nucleobases: Adenine (A), Guanine (G), Cytosine (C), and Thymine (T). Research laboratories invest large amounts of capital to engineer unique oligonucleotide sequences. In our work, we demonstrate the vulnerability of commonly used DNA synthesizers to acoustic side-channel attacks, where confidentiality can be breached to steal precious DNA sequences. We introduce a novel methodology to reverse engineer the acoustic noise generated by the DNA synthesizer and extract the type and order of the nucleobases delivered to the output. To the best of our knowledge, this is the first work which highlights the possibility of physical-to-cyber attacks in DNA synthesis technologies.","PeriodicalId":158690,"journal":{"name":"2020 ACM/IEEE 11th International Conference on Cyber-Physical Systems (ICCPS)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127699082","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
N. Shivaraman, Jakob Fittler, Saravanan Ramanathan, A. Easwaran, S. Steinhorst
{"title":"WiP Abstract: Mobility-based Load Balancing for IoT-enabled Devices in Smart Grids","authors":"N. Shivaraman, Jakob Fittler, Saravanan Ramanathan, A. Easwaran, S. Steinhorst","doi":"10.1109/ICCPS48487.2020.00029","DOIUrl":"https://doi.org/10.1109/ICCPS48487.2020.00029","url":null,"abstract":"There is an unprecedented load variability in the smart grids due to device (e.g. electric vehicles) mobility across different grid-locations. As a consequence, utility service providers have started exploring solutions such as dynamic pricing mechanisms, grid extensions and redistribution across micro-grids. However, most of these solutions do not exploit the transient nature of mobile devices. In this work, we propose an alternate mobility-based load balancing mechanism that exploits device-level flexibility. With recent advancements in Internet of Things (IoT) technology, we assume these devices to be equipped with IoT capabilities. We present an abstract model to capture the demand from these IoT-enabled devices in the form of a utility function. Our objective is to cater to the demand by incentivising device mobility without exceeding the peak load capacity across all grid-locations such that the overall utility of the devices is maximized.","PeriodicalId":158690,"journal":{"name":"2020 ACM/IEEE 11th International Conference on Cyber-Physical Systems (ICCPS)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126698418","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"WiP Abstract: Detection of False Injection Attacks Based on LTL for Fallback Control","authors":"Naomi Kuze, Ami Sakakibara, T. Ushio","doi":"10.1109/ICCPS48487.2020.00030","DOIUrl":"https://doi.org/10.1109/ICCPS48487.2020.00030","url":null,"abstract":"As the development of cyber-physical systems, it becomes important to consider security for physical systems, not only for cyber systems. In this paper, we focus on an UAV control system as an example of cyber-physical systems, and propose an UAV control system with fallback control for avoiding false injection attacks. Moreover, for improving both the safety and availability of the system, we proposed an attack detector based on the runtime verification with the LTL.","PeriodicalId":158690,"journal":{"name":"2020 ACM/IEEE 11th International Conference on Cyber-Physical Systems (ICCPS)","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115631255","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}