{"title":"Analyzing Implicit Interactions to Identify Weak Points in Cyber-Physical System Designs","authors":"Luke Newton, Jason Jaskolka","doi":"10.1109/RWS52686.2021.9611810","DOIUrl":null,"url":null,"abstract":"Cyber-physical systems often consist of many interacting components with numerous communication paths, some of which may be unintended and/or unforeseen by system designers. The existence of such paths, known as implicit interactions, represent security vulnerabilities that can be exploited to mount cyberattacks and destabilize a system. For any system with an abundance of implicit interactions, it can be difficult to understand which aspects of the design contribute most to the presence of this vulnerability. In this paper, we present an approach to identify weak points in the designs of cyber-physical systems based on frequency analyses of the interactions, both implicit and intended, present in a system design. We demonstrate the approach with a real-world Wastewater Dechlorination System. The proposed method can aid system designers in understanding which aspects of their systems contribute most to the existence of implicit interactions to enable effective mitigation strategies to improve overall system security and resilience.","PeriodicalId":294639,"journal":{"name":"2021 Resilience Week (RWS)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 Resilience Week (RWS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/RWS52686.2021.9611810","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Cyber-physical systems often consist of many interacting components with numerous communication paths, some of which may be unintended and/or unforeseen by system designers. The existence of such paths, known as implicit interactions, represent security vulnerabilities that can be exploited to mount cyberattacks and destabilize a system. For any system with an abundance of implicit interactions, it can be difficult to understand which aspects of the design contribute most to the presence of this vulnerability. In this paper, we present an approach to identify weak points in the designs of cyber-physical systems based on frequency analyses of the interactions, both implicit and intended, present in a system design. We demonstrate the approach with a real-world Wastewater Dechlorination System. The proposed method can aid system designers in understanding which aspects of their systems contribute most to the existence of implicit interactions to enable effective mitigation strategies to improve overall system security and resilience.