Corpus ID: 202715279

Cyber-Physical Systems Security Knowledge Area

  title={Cyber-Physical Systems Security Knowledge Area},
  author={Alvaro A. C{\'a}rdenas and Nils Ole Tippenhauer},

Figures from this paper

ASiMOV: A self-protecting control application for the smart factory
ASiMOV (Asynchronous Modular Verification), a self-protecting architecture for cyber–physical systems realizing a verifiable control application, is proposed, inspired by modular redundancy and leverages virtualization technologies to respond and to prevent cyber-attacks to the control logic. Expand
Security for Emerging Miniaturized Wireless Biomedical Devices: Threat Modeling with Application to Case Studies
A domain-specific qualitative-quantitative threat model dedicated to miniaturized wireless biomedical devices is introduced to help the architects and the manufacturers of MWBDs protect their emerging designs in a repeatable and structured manner. Expand
Process-Aware Model-based Intrusion Detection System on Filtering Approach: Further Investigations
This paper proposes report filter modelling, optimization algorithms for speeding up the computation of the detection indicators and an implementation on a real testbed of the Security Approach based on Filter Execution IDS. Expand
Towards Secure Application Development: A Cyber Security Centred Holistic Approach
  • Nana Onumah, Sam Attwood, R. Kharel
  • Computer Science
  • 2020 12th International Symposium on Communication Systems, Networks and Digital Signal Processing (CSNDSP)
  • 2020
This paper considers whether the lack of automation, integration, and secure development approaches limit its adoption and a holistic approach to secure development is explored as a means to overcome the aforementioned challenges. Expand
A Physics-Based Attack Detection Technique in Cyber-Physical Systems: A Model Predictive Control Co-Design Approach
A novel approach to co-design controller and attack detector for nonlinear cyber-physical systems affected by false data injection (FDI) attack is proposed and an additional constraint requiring the future—in some steps ahead—trajectory of the system to remain in some time-invariant neighborhood of a properly designed reference trajectory is augmented. Expand
Cyber-Physical Interdependencies in Power Plant Systems: A Review of Cyber Security Risks
In this paper, a comprehensive overview, based on the main features of the systems including communication direction, control parameters, research target, scalability, security and safety, is presented and the computational complexity associated with the approaches presented is assessed. Expand


Securing vulnerable home IoT devices with an in-hub security manager
A central security manager that is built on top of the smarthome's hub or gateway router and positioned to intercept all traffic to and from devices is proposed. Expand
Introduction to layers of protection analysis.
  • A. Summers
  • Medicine, Engineering
  • Journal of hazardous materials
  • 2003
An overview of the LOPA process is provided, highlighting the key considerations and applying semi-quantitative measures to the evaluation of the frequency of potential incidents and the probability of failure of the protection layers. Expand
The Past, Present and Future of Cyber-Physical Systems: A Focus on Models
Two projects show that deterministic CPS models with faithful physical realizations are possible and practical and shows that the timing precision of synchronous digital logic can be practically made available at the software level of abstraction. Expand
CPS: stateful policy enforcement for control system device usage
C2 is introduced, an enforcement mechanism for policies governing the usage of electromechanical devices, and takes measures to ensure unsafe behaviors are not caused when denying slightly erroneous yet legitimate operations. Expand
Stealth Attacks and Protection Schemes for State Estimators in Power Systems
  • G. Dán, H. Sandberg
  • Engineering
  • 2010 First IEEE International Conference on Smart Grid Communications
  • 2010
State estimators in power systems are currently used to, for example, detect faulty equipment and to route power flows. It is believed that state estimators will also play an increasingly importantExpand
Taking the integrated condition assessment system to the year 2010
  • 13th Int. Ship Control Systems Symposium, Orlando, FL, 2003.
  • 2003
Click Here to Kill Everybody: Security and Survival in a Hyper-connected World. WW
  • 2018
Industrial control systems security: What is happening?
  • M. Krotofil, D. Gollmann
  • Computer Science
  • 2013 11th IEEE International Conference on Industrial Informatics (INDIN)
  • 2013
The state of the art in ICS security research, including efforts of industrial researchers, is surveyed, with “secure control" as a new category to capture security goals specific to control systems that differ from security goals in traditional IT systems. Expand
International Law in Cyberspace: The Koh Speech and the Tallinn Manual Justaposed
Examines the speech by Legal Advisor Harold Kon on Cyber Law in light of the Tallinn Manual on the International Law Appicable to Cyber Warfare.