Relational Analysis of Sensor Attacks on Cyber-Physical Systems

@article{Xiang2021RelationalAO,
  title={Relational Analysis of Sensor Attacks on Cyber-Physical Systems},
  author={Jian Xiang and Nathan Fulton and Stephen Chong},
  journal={2021 IEEE 34th Computer Security Foundations Symposium (CSF)},
  year={2021},
  pages={1-16}
}
Cyber-physical systems, such as self-driving cars or autonomous aircraft, must defend against attacks that target sensor hardware. Analyzing system design can help engineers understand how a compromised sensor could impact the system’s behavior; however, designing security analyses for cyber-physical systems is difficult due to their combination of discrete dynamics, continuous dynamics, and nondeterminism.This paper contributes a framework for modeling and analyzing sensor attacks on cyber… 

References

SHOWING 1-10 OF 75 REFERENCES

Secure Autonomous Cyber-Physical Systems Through Verifiable Information Flow Control

An integrated architecture to provide provable security and safety assurance for cyber-physical systems by ensuring that safety-critical operations and control cannot be unintentionally affected by potentially malicious parts of the system is introduced.

A Formal Approach to Physics-based Attacks in Cyber-physical Systems

A hybrid process calculus is defined to model both CPSs and physics-based attacks and how to estimate the impact of a successful attack on a CPS and investigate possible quantifications of the success chances of an attack.

Detecting security leaks in hybrid systems with information flow analysis

An algorithm is proposed that generates security constraints between each sub-component of hybrid automata, and then transforms these constraints into a directed dependency graph to search for non-interference violations and can be applied directly to parallel compositions of automata without resorting to model-flattening techniques.

A Formal Approach to Cyber-Physical Attacks

This work defines a hybrid process calculus to model both CPSs and cyber-physical attacks and provides the means to assess attack tolerance/vulnerability with respect to a given attack.

A Hybrid, Dynamic Logic for Hybrid-Dynamic Information Flow

This work introduces dHL, the first logic for verifying HDIFs in hybrid-dynamical models of CPSs, and proves that the naive model has a previously unknown information flow vulnerability, which is verified is resolved in a revised model.

Robustness of attack-resilient state estimators

This work presents a method for state estimation in presence of attacks, for systems with noise and modeling errors, and describes how implementation issues such as jitter, latency and synchronization errors can be mapped into parameters of the state estimation procedure that describe modeling errors.

Attack-Resilient State Estimation for Noisy Dynamical Systems

This paper focuses on the most general model for sensor attacks where any signal can be injected via compromised sensors, and presents an attack-resilient state estimator that can be formulated as a mixed-integer linear program and its convex relaxation based on the LaTeX norm.

Principles of Cyber-Physical Systems

This book provides the rapidly expanding field of cyber-physical systems with a long-needed foundational text by an established authority and is suitable for classroom use or as a reference for professionals.

Non-invasive Spoofing Attacks for Anti-lock Braking Systems

The development of a prototype ABS spoofer is described to enable a disruptive, naive attack aimed to corrupt the measured wheel speed by overwhelming the original signal and a more advanced spoofing attack, designed to inject a counter-signal such that the braking system mistakenly reports a specific velocity.

Introduction to Embedded Systems - A Cyber-Physical Systems Approach

This book takes a cyber-physical approach to embedded systems, introducing the engineering concepts underlying embedded systems as a technology and as a subject of study.
...