{"title":"泄漏的CPS:从物理属性推断网络信息(反之亦然)","authors":"M. Conti","doi":"10.1145/3198458.3198468","DOIUrl":null,"url":null,"abstract":"The nature of Cyber-physical systems (CPS) is to integrate physical environments with computing capabilities, building a \"channel\" between the physical and the cyber world, with a continuous exchange of data and commands. From this inherent behaviour, observing data/behaviour on one side might lead to leakage of information about the status of the other side. This could be leveraged for both benign and malicious purposes. In this talk, we focus on this issue, discussing some of the core approaches and representative scenarios.","PeriodicalId":296635,"journal":{"name":"Proceedings of the 4th ACM Workshop on Cyber-Physical System Security","volume":"28 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Leaky CPS: Inferring Cyber Information from Physical Properties (and the other way around)\",\"authors\":\"M. Conti\",\"doi\":\"10.1145/3198458.3198468\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The nature of Cyber-physical systems (CPS) is to integrate physical environments with computing capabilities, building a \\\"channel\\\" between the physical and the cyber world, with a continuous exchange of data and commands. From this inherent behaviour, observing data/behaviour on one side might lead to leakage of information about the status of the other side. This could be leveraged for both benign and malicious purposes. In this talk, we focus on this issue, discussing some of the core approaches and representative scenarios.\",\"PeriodicalId\":296635,\"journal\":{\"name\":\"Proceedings of the 4th ACM Workshop on Cyber-Physical System Security\",\"volume\":\"28 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-05-22\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings of the 4th ACM Workshop on Cyber-Physical System Security\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1145/3198458.3198468\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 4th ACM Workshop on Cyber-Physical System Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3198458.3198468","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Leaky CPS: Inferring Cyber Information from Physical Properties (and the other way around)
The nature of Cyber-physical systems (CPS) is to integrate physical environments with computing capabilities, building a "channel" between the physical and the cyber world, with a continuous exchange of data and commands. From this inherent behaviour, observing data/behaviour on one side might lead to leakage of information about the status of the other side. This could be leveraged for both benign and malicious purposes. In this talk, we focus on this issue, discussing some of the core approaches and representative scenarios.