2016 Science of Security for Cyber-Physical Systems Workshop (SOSCYPS)最新文献

筛选
英文 中文
Advances and challenges of quantitative verification and synthesis for cyber-physical systems 信息物理系统定量验证与综合的进展与挑战
2016 Science of Security for Cyber-Physical Systems Workshop (SOSCYPS) Pub Date : 2016-04-11 DOI: 10.1109/SOSCYPS.2016.7579999
Marta Z. Kwiatkowska
{"title":"Advances and challenges of quantitative verification and synthesis for cyber-physical systems","authors":"Marta Z. Kwiatkowska","doi":"10.1109/SOSCYPS.2016.7579999","DOIUrl":"https://doi.org/10.1109/SOSCYPS.2016.7579999","url":null,"abstract":"We are witnessing a huge growth of cyber-physical systems, which are autonomous, mobile, endowed with sensing, controlled by software, and often wirelessly connected and Internet-enabled. They include factory automation systems, robotic assistants, self-driving cars, and wearable and implantable devices. Since they are increasingly often used in safety- or business-critical contexts, to mention invasive treatment or biometric authentication, there is an urgent need for modelling and verification technologies to support the design process, and hence improve the reliability and reduce production costs. This paper gives an overview of quantitative verification and synthesis techniques developed for cyber-physical systems, summarising recent achievements and future challenges in this important field.","PeriodicalId":422727,"journal":{"name":"2016 Science of Security for Cyber-Physical Systems Workshop (SOSCYPS)","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131996681","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Towards foundational verification of cyber-physical systems 迈向网络物理系统的基础验证
2016 Science of Security for Cyber-Physical Systems Workshop (SOSCYPS) Pub Date : 2016-04-11 DOI: 10.1109/SOSCYPS.2016.7580000
G. Malecha, Daniel Ricketts, Mario M. Alvarez, Sorin Lerner
{"title":"Towards foundational verification of cyber-physical systems","authors":"G. Malecha, Daniel Ricketts, Mario M. Alvarez, Sorin Lerner","doi":"10.1109/SOSCYPS.2016.7580000","DOIUrl":"https://doi.org/10.1109/SOSCYPS.2016.7580000","url":null,"abstract":"The safety-critical aspects of cyber-physical systems motivate the need for rigorous analysis of these systems. In the literature this work is often done using idealized models of systems where the analysis can be carried out using high-level reasoning techniques such as Lyapunov functions and model checking. In this paper we present VERIDRONE, a foundational framework for reasoning about cyber-physical systems at all levels from high-level models to C code that implements the system. VERIDRONE is a library within the Coq proof assistant enabling us to build on its foundational implementation, its interactive development environments, and its wealth of libraries capturing interesting theories ranging from real numbers and differential equations to verified compilers and floating point numbers. These features make proof assistants in general, and Coq in particular, a powerful platform for unifying foundational results about safety-critical systems and ensuring interesting properties at all levels of the stack.","PeriodicalId":422727,"journal":{"name":"2016 Science of Security for Cyber-Physical Systems Workshop (SOSCYPS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122824828","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
From control system security indices to attack identifiability 从控制系统安全指标到攻击可识别性
2016 Science of Security for Cyber-Physical Systems Workshop (SOSCYPS) Pub Date : 2016-04-11 DOI: 10.1109/SOSCYPS.2016.7580001
H. Sandberg, André M. H. Teixeira
{"title":"From control system security indices to attack identifiability","authors":"H. Sandberg, André M. H. Teixeira","doi":"10.1109/SOSCYPS.2016.7580001","DOIUrl":"https://doi.org/10.1109/SOSCYPS.2016.7580001","url":null,"abstract":"In this paper, we investigate detectability and identifiability of attacks on linear dynamical systems that are subjected to external disturbances. We generalize a concept for a security index, which was previously introduced for static systems. The index exactly quantifies the resources necessary for targeted attacks to be undetectable and unidentifiable in the presence of disturbances. This information is useful for both risk assessment and for the design of anomaly detectors. Finally, we show how techniques from the fault detection literature can be used to decouple disturbances and to identify attacks, under certain sparsity constraints.","PeriodicalId":422727,"journal":{"name":"2016 Science of Security for Cyber-Physical Systems Workshop (SOSCYPS)","volume":"37 15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125704030","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
Security games on infrastructure networks 基础设施网络上的安全游戏
2016 Science of Security for Cyber-Physical Systems Workshop (SOSCYPS) Pub Date : 2016-04-11 DOI: 10.1109/SOSCYPS.2016.7579997
Saurabh Amin
{"title":"Security games on infrastructure networks","authors":"Saurabh Amin","doi":"10.1109/SOSCYPS.2016.7579997","DOIUrl":"https://doi.org/10.1109/SOSCYPS.2016.7579997","url":null,"abstract":"The theory of robust control models the controller-disturbance interaction as a game where disturbance is nonstrategic. The proviso of a deliberately malicious (strategic) attacker should be considered to increase the robustness of infrastructure systems. This has become especially important since many IT systems supporting critical functionalities are vulnerable to exploits by attackers. While the usefulness of game theory methods for modeling cyber-security is well established in the literature, new game theoretic models of cyber-physical security are needed for deriving useful insights on \"optimal\" attack plans and defender responses, both in terms of allocation of resources and operational strategies of these players. This whitepaper presents some progress and challenges in using game-theoretic models for security of infrastructure networks. Main insights from the following models are presented: (i) Network security game on flow networks under strategic edge disruptions; (ii) Interdiction problem on distribution networks under node disruptions; (iii) Inspection game to monitor commercial non-technical losses (e.g. energy diversion); and (iv) Interdependent security game of networked control systems under communication failures. These models can be used to analyze the attacker-defender interactions in a class of cyber-physical security scenarios.","PeriodicalId":422727,"journal":{"name":"2016 Science of Security for Cyber-Physical Systems Workshop (SOSCYPS)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127057021","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Accountability in cyber-physical systems 网络物理系统中的责任
2016 Science of Security for Cyber-Physical Systems Workshop (SOSCYPS) Pub Date : 2016-04-11 DOI: 10.1109/SOSCYPS.2016.7579998
Anupam Datta, S. Kar, B. Sinopoli, Sean Weerakkody
{"title":"Accountability in cyber-physical systems","authors":"Anupam Datta, S. Kar, B. Sinopoli, Sean Weerakkody","doi":"10.1109/SOSCYPS.2016.7579998","DOIUrl":"https://doi.org/10.1109/SOSCYPS.2016.7579998","url":null,"abstract":"Our position is that a key component of securing cyber-physical systems (CPS) is to develop a theory of accountability that encompasses both control and computing systems. We envision that a unified theory of accountability in CPS can be built on a foundation of causal information flow analysis. This theory will support design and analysis of mechanisms at various stages of the accountability regime: attack detection, responsibility-assignment (e.g., attack identification or localization), and corrective measures (e.g., via resilient control) As an initial step in this direction, we summarize our results on attack detection in control systems. We use the Kullback-Liebler (KL) divergence as a causal information flow measure. We then recover, using information flow analyses, a set of existing results in the literature that were previously proved using different techniques. These results cover passive detection, stealthy attack characterization, and active detection. This research direction is related to recent work on accountability in computational systems [1], [2], [3], [4]. We envision that by casting accountability theories in computing and control systems in terms of causal information flow, we can provide a common foundation to develop a theory for CPS that compose elements from both domains.","PeriodicalId":422727,"journal":{"name":"2016 Science of Security for Cyber-Physical Systems Workshop (SOSCYPS)","volume":"136 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123416860","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
A set-theoretic approach for secure and resilient control of Cyber-Physical Systems subject to false data injection attacks 针对虚假数据注入攻击的网络物理系统安全弹性控制的集合理论方法
2016 Science of Security for Cyber-Physical Systems Workshop (SOSCYPS) Pub Date : 2016-04-11 DOI: 10.1109/SOSCYPS.2016.7580002
Walter Lucia, B. Sinopoli, G. Franzé
{"title":"A set-theoretic approach for secure and resilient control of Cyber-Physical Systems subject to false data injection attacks","authors":"Walter Lucia, B. Sinopoli, G. Franzé","doi":"10.1109/SOSCYPS.2016.7580002","DOIUrl":"https://doi.org/10.1109/SOSCYPS.2016.7580002","url":null,"abstract":"In this paper a novel set-theoretic control framework for Cyber-Physical Systems is presented. By resorting to set-theoretic ideas, an anomaly detector module and a control remediation strategy are formally derived with the aim to contrast cyber False Data Injection (FDI) attacks affecting the communication channels. The resulting scheme ensures Uniformly Ultimate Boundedness and constraints fulfillment regardless of any admissible attack scenario.","PeriodicalId":422727,"journal":{"name":"2016 Science of Security for Cyber-Physical Systems Workshop (SOSCYPS)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130714485","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 30
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信