• Corpus ID: 202715279

Cyber-Physical Systems Security Knowledge Area

  title={Cyber-Physical Systems Security Knowledge Area},
  author={Alvaro A. C{\'a}rdenas and Nils Ole Tippenhauer},

Figures from this paper

Design Hands-on Lab Exercises for Cyber-physical Systems Security Education
The execution of a free security testbed to replicate a vehicle’s network system and the implementation of this testbed via hands-on lab designed to introduce concepts of vehicle control systems are described.
The Powerful Use of AI in the Energy Sector: Intelligent Forecasting
This paper proposes a methodology to develop, deploy, and evaluate AI systems in the energy sector by understanding the power system measurements with physics, designing AI algorithms to forecast the need, developing robust and accountable AI methods, and creating reliable measures to evaluate the performance of the AI model.
Security for Emerging Miniaturized Wireless Biomedical Devices: Threat Modeling with Application to Case Studies
A domain-specific qualitative-quantitative threat model dedicated to miniaturized wireless biomedical devices is introduced to help the architects and the manufacturers of MWBDs protect their emerging designs in a repeatable and structured manner.
ASiMOV: A self-protecting control application for the smart factory
Towards Secure Application Development: A Cyber Security Centred Holistic Approach
  • Nana Onumah, Sam Attwood, R. Kharel
  • Computer Science
    2020 12th International Symposium on Communication Systems, Networks and Digital Signal Processing (CSNDSP)
  • 2020
This paper considers whether the lack of automation, integration, and secure development approaches limit its adoption and a holistic approach to secure development is explored as a means to overcome the aforementioned challenges.
Process-Aware Model-based Intrusion Detection System on Filtering Approach: Further Investigations
This paper proposes report filter modelling, optimization algorithms for speeding up the computation of the detection indicators and an implementation on a real testbed of the Security Approach based on Filter Execution IDS.
Cyber-Physical Interdependencies in Power Plant Systems: A Review of Cyber Security Risks
In this paper, a comprehensive overview, based on the main features of the systems including communication direction, control parameters, research target, scalability, security and safety, is presented and the computational complexity associated with the approaches presented is assessed.
A Physics-Based Attack Detection Technique in Cyber-Physical Systems: A Model Predictive Control Co-Design Approach
A novel approach to co-design controller and attack detector for nonlinear cyber-physical systems affected by false data injection (FDI) attack is proposed and an additional constraint requiring the future—in some steps ahead—trajectory of the system to remain in some time-invariant neighborhood of a properly designed reference trajectory is augmented.


Introduction to layers of protection analysis.
  • A. Summers
  • Business
    Journal of hazardous materials
  • 2003
Securing vulnerable home IoT devices with an in-hub security manager
A central security manager that is built on top of the smarthome's hub or gateway router and positioned to intercept all traffic to and from devices is proposed.
Research Challenges for the Security of Control Systems
This paper proposes a new mathematical framework to analyze attacks against control systems and formulates specific research problems to detect attacks, and survive attacks.
CPS: stateful policy enforcement for control system device usage
C2 is introduced, an enforcement mechanism for policies governing the usage of electromechanical devices, and takes measures to ensure unsafe behaviors are not caused when denying slightly erroneous yet legitimate operations.
The Past, Present and Future of Cyber-Physical Systems: A Focus on Models
Two projects show that deterministic CPS models with faithful physical realizations are possible and practical and shows that the timing precision of synchronous digital logic can be practically made available at the software level of abstraction.
Stealth Attacks and Protection Schemes for State Estimators in Power Systems
  • G. Dán, H. Sandberg
  • Computer Science, Engineering
    2010 First IEEE International Conference on Smart Grid Communications
  • 2010
This work proposes two algorithms to place encrypted devices in the system such as to maximize their utility in terms of increased system security, and illustrates the effectiveness of these algorithms on two IEEE benchmark power networks under two attack and protection cost models.
Taking the integrated condition assessment system to the year 2010
  • 13th Int. Ship Control Systems Symposium, Orlando, FL, 2003.
  • 2003
International Law in Cyberspace: The Koh Speech and the Tallinn Manual Justaposed
Examines the speech by Legal Advisor Harold Kon on Cyber Law in light of the Tallinn Manual on the International Law Appicable to Cyber Warfare.
Wired for War: The Robotics Revolution and Conflict in the 21st Century
Dr. Singer is a person who likes to tackle provocative topics, and does so in a very engaging and instructive manner. Subjects such as child soldiers and military outsourcing are subjects of his