首页 > 最新文献

2020 ACM/IEEE 11th International Conference on Cyber-Physical Systems (ICCPS)最新文献

英文 中文
SIMPLE: A Remote Attestation Approach for Resource-constrained IoT devices SIMPLE:用于资源受限物联网设备的远程认证方法
Pub Date : 2020-04-01 DOI: 10.1109/ICCPS48487.2020.00036
M. Ammar, B. Crispo, G. Tsudik
Remote Attestation (RA) is a security service that detects malware presence on remote IoT devices by verifying their software integrity by a trusted party (verifier). There are three main types of RA: software (SW)-, hardware (HW)-, and hybrid (SW/HW)-based. Hybrid techniques obtain secure RA with minimal hardware requirements imposed on the architectures of existing microcontrollers units (MCUs). In recent years, considerable attention has been devoted to hybrid techniques since prior software-based ones lack concrete security guarantees in a remote setting, while hardware-based approaches are too costly for low-end MCUs. However, one key problem is that many already deployed IoT devices neither satisfy minimal hardware requirements nor support hardware modifications, needed for hybrid RA.This paper bridges the gap between software-based and hybrid RA by proposing a novel RA scheme based on software virtualization. In particular, it proposes a new scheme, called SIMPLE, which meets the minimal hardware requirements needed for secure RA via reliable software. SIMPLE depends on a formally-verified software-based memory isolation technique, called Security MicroVisor (Sμ V). Its reliability is achieved by extending the formally-verified safety and correctness properties to cover the entire software architecture of SIMPLE. Furthermore, SIMPLE is used to construct SIMPLE+, an efficient swarm attestation scheme for static and dynamic heterogeneous IoT networks. We implement and evaluate SIMPLE and SIMPLE+ on Atmel AVR architecture, a common MCU platform.
远程认证(RA)是一种安全服务,通过由受信任方(验证者)验证其软件完整性来检测远程物联网设备上存在的恶意软件。RA主要有三种类型:基于软件(SW)的、基于硬件(HW)的和基于混合(SW/HW)的。混合技术在对现有微控制器(mcu)架构施加最小硬件要求的情况下获得安全RA。近年来,由于先前基于软件的方法在远程设置中缺乏具体的安全保证,而基于硬件的方法对于低端mcu来说过于昂贵,因此混合技术受到了相当大的关注。然而,一个关键问题是,许多已经部署的物联网设备既不能满足混合RA所需的最低硬件要求,也不支持硬件修改。本文提出了一种基于软件虚拟化的RA方案,弥补了基于软件的RA和混合RA之间的差距。特别地,它提出了一个新的方案,称为SIMPLE,它通过可靠的软件满足安全RA所需的最低硬件要求。SIMPLE依赖于一种经过正式验证的基于软件的内存隔离技术,称为Security MicroVisor (Security MicroVisor),其可靠性是通过扩展经过正式验证的安全性和正确性属性来实现的,该特性覆盖了SIMPLE的整个软件架构。在此基础上,利用SIMPLE构建了针对静态和动态异构物联网网络的高效群认证方案SIMPLE+。我们在通用的单片机平台Atmel AVR架构上对SIMPLE和SIMPLE+进行了实现和评估。
{"title":"SIMPLE: A Remote Attestation Approach for Resource-constrained IoT devices","authors":"M. Ammar, B. Crispo, G. Tsudik","doi":"10.1109/ICCPS48487.2020.00036","DOIUrl":"https://doi.org/10.1109/ICCPS48487.2020.00036","url":null,"abstract":"Remote Attestation (RA) is a security service that detects malware presence on remote IoT devices by verifying their software integrity by a trusted party (verifier). There are three main types of RA: software (SW)-, hardware (HW)-, and hybrid (SW/HW)-based. Hybrid techniques obtain secure RA with minimal hardware requirements imposed on the architectures of existing microcontrollers units (MCUs). In recent years, considerable attention has been devoted to hybrid techniques since prior software-based ones lack concrete security guarantees in a remote setting, while hardware-based approaches are too costly for low-end MCUs. However, one key problem is that many already deployed IoT devices neither satisfy minimal hardware requirements nor support hardware modifications, needed for hybrid RA.This paper bridges the gap between software-based and hybrid RA by proposing a novel RA scheme based on software virtualization. In particular, it proposes a new scheme, called SIMPLE, which meets the minimal hardware requirements needed for secure RA via reliable software. SIMPLE depends on a formally-verified software-based memory isolation technique, called Security MicroVisor (Sμ V). Its reliability is achieved by extending the formally-verified safety and correctness properties to cover the entire software architecture of SIMPLE. Furthermore, SIMPLE is used to construct SIMPLE+, an efficient swarm attestation scheme for static and dynamic heterogeneous IoT networks. We implement and evaluate SIMPLE and SIMPLE+ on Atmel AVR architecture, a common MCU platform.","PeriodicalId":158690,"journal":{"name":"2020 ACM/IEEE 11th International Conference on Cyber-Physical Systems (ICCPS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129702041","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 31
Control Reconfiguration of Cyber-physical Systems for Improved Performance via Reverse-engineering and Accelerated First-order Algorithms 通过逆向工程和加速一阶算法提高性能的信息物理系统控制重构
Pub Date : 2020-04-01 DOI: 10.1109/ICCPS48487.2020.00034
H. Shu, Xuan Zhang, Na Li, A. Papachristodoulou
This paper presents a control reconfiguration approach to improve the performance of a certain class of dynamical systems. Motivated by recent research on re-engineering cyber-physical systems, we propose a three-step control retrofit procedure. Firstly, we reverse-engineer a dynamical system as a gradient descent algorithm to solve an unconstrained convex optimization problem. Secondly, we apply a heavy ball method or an accelerated gradient descent algorithm with constant coefficients to solve this optimization problem. Finally, by com-paring the original and accelerated dynamics, we obtain the implementation of the redesigned part (i.e., the extra dynamics). As a result, the convergence rate/speed of the given system can be improved, while the system structure remains. Three practical applications, including consensus in multi-agent systems, Internet congestion control and temperature control in buildings, show the effectiveness of the proposed redesign approach.
本文提出了一种控制重构方法来改善一类动态系统的性能。基于对网络物理系统再造的最新研究,我们提出了一个三步控制改造程序。首先,我们将一个动态系统作为梯度下降算法进行逆向工程,以解决无约束凸优化问题。其次,我们采用重球法或常系数加速梯度下降算法来解决该优化问题。最后,通过对原始动力学和加速动力学的比较,我们得到了重新设计部分的实现(即额外的动力学)。因此,在保持系统结构不变的情况下,可以提高给定系统的收敛速率/速度。三个实际应用,包括多智能体系统中的共识、互联网拥塞控制和建筑物中的温度控制,表明了所提出的重新设计方法的有效性。
{"title":"Control Reconfiguration of Cyber-physical Systems for Improved Performance via Reverse-engineering and Accelerated First-order Algorithms","authors":"H. Shu, Xuan Zhang, Na Li, A. Papachristodoulou","doi":"10.1109/ICCPS48487.2020.00034","DOIUrl":"https://doi.org/10.1109/ICCPS48487.2020.00034","url":null,"abstract":"This paper presents a control reconfiguration approach to improve the performance of a certain class of dynamical systems. Motivated by recent research on re-engineering cyber-physical systems, we propose a three-step control retrofit procedure. Firstly, we reverse-engineer a dynamical system as a gradient descent algorithm to solve an unconstrained convex optimization problem. Secondly, we apply a heavy ball method or an accelerated gradient descent algorithm with constant coefficients to solve this optimization problem. Finally, by com-paring the original and accelerated dynamics, we obtain the implementation of the redesigned part (i.e., the extra dynamics). As a result, the convergence rate/speed of the given system can be improved, while the system structure remains. Three practical applications, including consensus in multi-agent systems, Internet congestion control and temperature control in buildings, show the effectiveness of the proposed redesign approach.","PeriodicalId":158690,"journal":{"name":"2020 ACM/IEEE 11th International Conference on Cyber-Physical Systems (ICCPS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130146336","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Game-Theoretic Approach to Secure Estimation and Control for Cyber-Physical Systems with a Digital Twin 具有数字孪生的信息物理系统安全估计与控制的博弈论方法
Pub Date : 2020-04-01 DOI: 10.1109/ICCPS48487.2020.00010
Zhiheng Xu, A. Easwaran
Cyber-Physical Systems (CPSs) play an increasingly significant role in many critical applications. These valuable applications attract various sophisticated attacks. This paper considers a stealthy estimation attack, which aims to modify the state estimation of the CPSs. The intelligent attackers can learn defense strategies and use clandestine attack strategies to avoid detection. To address the issue, we design a Chi-square detector in a Digital Twin (DT), which is an online digital model of the physical system. We use a Signaling Game with Evidence (SGE) to find the optimal attack and defense strategies. Our analytical results show that the proposed defense strategies can mitigate the impact of the attack on the physical estimation and guarantee the stability of the CPSs. Finally, we use an illustrative application to evaluate the performance of the proposed framework.
信息物理系统(cps)在许多关键应用中发挥着越来越重要的作用。这些有价值的应用程序吸引了各种复杂的攻击。本文考虑了一种隐身估计攻击,其目的是修改cps的状态估计。智能攻击者可以学习防御策略,并使用秘密攻击策略来避免被检测到。为了解决这个问题,我们在数字孪生体(DT)中设计了一个卡方检测器,这是物理系统的在线数字模型。我们使用带有证据的信号博弈(SGE)来寻找最佳的攻击和防御策略。分析结果表明,所提出的防御策略可以减轻攻击对物理估计的影响,并保证cps的稳定性。最后,我们使用一个说明性应用程序来评估所提出框架的性能。
{"title":"A Game-Theoretic Approach to Secure Estimation and Control for Cyber-Physical Systems with a Digital Twin","authors":"Zhiheng Xu, A. Easwaran","doi":"10.1109/ICCPS48487.2020.00010","DOIUrl":"https://doi.org/10.1109/ICCPS48487.2020.00010","url":null,"abstract":"Cyber-Physical Systems (CPSs) play an increasingly significant role in many critical applications. These valuable applications attract various sophisticated attacks. This paper considers a stealthy estimation attack, which aims to modify the state estimation of the CPSs. The intelligent attackers can learn defense strategies and use clandestine attack strategies to avoid detection. To address the issue, we design a Chi-square detector in a Digital Twin (DT), which is an online digital model of the physical system. We use a Signaling Game with Evidence (SGE) to find the optimal attack and defense strategies. Our analytical results show that the proposed defense strategies can mitigate the impact of the attack on the physical estimation and guarantee the stability of the CPSs. Finally, we use an illustrative application to evaluate the performance of the proposed framework.","PeriodicalId":158690,"journal":{"name":"2020 ACM/IEEE 11th International Conference on Cyber-Physical Systems (ICCPS)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116130869","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Formalizing traffic rules for uncontrolled intersections 制定不受控制的十字路口的交通规则
Pub Date : 2020-04-01 DOI: 10.1109/ICCPS48487.2020.00012
Abolfazl Karimi, Parasara Sridhar Duggirala
One of the challenges in designing autonomous vehicles (AV’s) is driving around humans (i.e. drivers, cyclists, pedestrians, etc.) In particular, the AV’s and the humans must have a common set of traffic rules to follow. In this paper, we present a new approach to formalize and implement traffic rules. We use California’s DMV driver handbook as a working example. Our approach provides a straightforward mapping from the rules in the handbook to its formal model, and from the model to its implementation. To demonstrate the efficiency of this approach, we formally model the traffic rules in the logic programming paradigm of Answer Set Programming (ASP) using a programming language called Clingo. We then integrate these rules into CARLA, a virtual test bed environment for autonomous vehicles. We simulate the behavior of autonomous vehicles at four way and three way uncontrolled intersections by correct reasoning of right-of-way rules for autonomous vehicles in real time. As a result, the behaviors of autonomous vehicles under our controller are more realistic compared to CARLA’s default FIFO controller. This also improves the throughput of the traffic through the intersection.
设计自动驾驶汽车(AV)的挑战之一是在人类(即司机,骑自行车的人,行人等)周围行驶,特别是自动驾驶汽车和人类必须遵守一套共同的交通规则。在本文中,我们提出了一种形式化和实现交通规则的新方法。我们以加州DMV驾驶员手册为例。我们的方法提供了从手册中的规则到其正式模型,以及从模型到其实现的直接映射。为了证明这种方法的效率,我们使用一种名为Clingo的编程语言,在回答集编程(ASP)的逻辑编程范式中正式地对流量规则进行建模。然后,我们将这些规则集成到自动驾驶汽车的虚拟测试平台环境CARLA中。通过对自动驾驶汽车路权规则的实时正确推理,模拟了自动驾驶汽车在四向和三向非受控交叉口的行为。因此,与CARLA的默认FIFO控制器相比,我们的控制器下自动驾驶车辆的行为更加真实。这也提高了通过路口的交通吞吐量。
{"title":"Formalizing traffic rules for uncontrolled intersections","authors":"Abolfazl Karimi, Parasara Sridhar Duggirala","doi":"10.1109/ICCPS48487.2020.00012","DOIUrl":"https://doi.org/10.1109/ICCPS48487.2020.00012","url":null,"abstract":"One of the challenges in designing autonomous vehicles (AV’s) is driving around humans (i.e. drivers, cyclists, pedestrians, etc.) In particular, the AV’s and the humans must have a common set of traffic rules to follow. In this paper, we present a new approach to formalize and implement traffic rules. We use California’s DMV driver handbook as a working example. Our approach provides a straightforward mapping from the rules in the handbook to its formal model, and from the model to its implementation. To demonstrate the efficiency of this approach, we formally model the traffic rules in the logic programming paradigm of Answer Set Programming (ASP) using a programming language called Clingo. We then integrate these rules into CARLA, a virtual test bed environment for autonomous vehicles. We simulate the behavior of autonomous vehicles at four way and three way uncontrolled intersections by correct reasoning of right-of-way rules for autonomous vehicles in real time. As a result, the behaviors of autonomous vehicles under our controller are more realistic compared to CARLA’s default FIFO controller. This also improves the throughput of the traffic through the intersection.","PeriodicalId":158690,"journal":{"name":"2020 ACM/IEEE 11th International Conference on Cyber-Physical Systems (ICCPS)","volume":"143 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122552878","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Dynamic Network Slicing for the Tactile Internet 触觉互联网的动态网络切片
Pub Date : 2020-04-01 DOI: 10.1109/ICCPS48487.2020.00020
Kurian Polachan, Belma Turkovic, Prabhakar T. Venkata, C. Singh, F. Kuipers
Tactile internet" refers to a network that can support real-time interactions between human operators and remote cyber-physical systems as if they were near to each other. For this, the network should support ultra-low latency communication, often referred to as the 1ms challenge. However, we observe that network requirements, such as latency and bandwidth, of tactile internet based cyber-physical systems or Tactile Cyber-Physical Systems (TCPS) are not static: they severely fluctuate over time. Therefore, for TCPS, static provisioning of network resources is sub-optimal. For optimal utilization of network resources, we propose a mechanism to, per TCPS flow, dynamically create, destroy and switch network slices, based on the network resources needed at that time. Our solution consists of two main components. First, we develop a clustering algorithm to determine the slices and their specifications required to support a TCPS flow. Second, we leverage Software-Defined Networking (SDN) and P4-programmable switches to enable on- the-fly provisioning and switching of these slices.
“触觉互联网”指的是一种可以支持人类操作员和远程网络物理系统之间实时交互的网络,就好像他们彼此很近一样。为此,网络应该支持超低延迟通信,通常称为1ms挑战。然而,我们观察到,基于触觉互联网的网络物理系统或触觉网络物理系统(TCPS)的网络需求,如延迟和带宽,不是静态的:它们随着时间的推移而剧烈波动。因此,对于tcp,静态提供网络资源是次优的。为了实现网络资源的最优利用,我们提出了一种机制,在每个tcp流中,根据当时需要的网络资源,动态地创建、销毁和切换网络片。我们的解决方案由两个主要部分组成。首先,我们开发了一个聚类算法来确定支持tcp流所需的片及其规范。其次,我们利用软件定义网络(SDN)和p4可编程交换机来实现这些切片的实时供应和交换。
{"title":"Dynamic Network Slicing for the Tactile Internet","authors":"Kurian Polachan, Belma Turkovic, Prabhakar T. Venkata, C. Singh, F. Kuipers","doi":"10.1109/ICCPS48487.2020.00020","DOIUrl":"https://doi.org/10.1109/ICCPS48487.2020.00020","url":null,"abstract":"Tactile internet\" refers to a network that can support real-time interactions between human operators and remote cyber-physical systems as if they were near to each other. For this, the network should support ultra-low latency communication, often referred to as the 1ms challenge. However, we observe that network requirements, such as latency and bandwidth, of tactile internet based cyber-physical systems or Tactile Cyber-Physical Systems (TCPS) are not static: they severely fluctuate over time. Therefore, for TCPS, static provisioning of network resources is sub-optimal. For optimal utilization of network resources, we propose a mechanism to, per TCPS flow, dynamically create, destroy and switch network slices, based on the network resources needed at that time. Our solution consists of two main components. First, we develop a clustering algorithm to determine the slices and their specifications required to support a TCPS flow. Second, we leverage Software-Defined Networking (SDN) and P4-programmable switches to enable on- the-fly provisioning and switching of these slices.","PeriodicalId":158690,"journal":{"name":"2020 ACM/IEEE 11th International Conference on Cyber-Physical Systems (ICCPS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129946082","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Contextually-aware Fetal Sensing in Transabdominal Fetal Pulse Oximetry 经腹胎儿脉搏血氧测定中的情境感知胎儿感测
Pub Date : 2020-04-01 DOI: 10.1109/ICCPS48487.2020.00019
Daniel D. Fong, Kourosh Vali, S. Ghiasi
Transabdominal fetal pulse oximetry (TFO) is a noninvasive technique that can provide physicians with a convenient measure of fetal oxygen saturation. This is accomplished by sending a known light intensity signal towards the mother’s abdomen, where it is modified by the maternal and fetal tissues, and observed some distance away. The measured signal, captured by a photodetector, contains a mixture of both maternal and fetal information, where the fetal portion must be extracted to calculate the fetal oxygen saturation. However, the ability to decouple the maternal and fetal components is highly dependent on the physiological and structural parameters of the physical system, making it difficult to robustly extract the fetal signal across patients over a long-period of time. In this work, we propose a contextually-aware sensing approach that utilizes additional information about the physical system (physiological, spatial, and temporal) to extract the fetal signal. It does this by using easily-measurable parameters of the mother’s physiology to reduce the maternal impact, incorporating data fusion techniques to combine spatial information from multiple detectors, and utilizing historical data points to improve and validate the fetal signal estimates. The efficacy of the proposed approach is supported by experimental evaluation using in vivo measurements captured on pregnant sheep.
经腹胎儿脉搏血氧仪(TFO)是一种无创技术,可以为医生提供一个方便的测量胎儿血氧饱和度。这是通过向母亲的腹部发送已知的光强度信号来完成的,在那里它被母体和胎儿组织修改,并在一定距离外观察到。由光电探测器捕获的测量信号包含母体和胎儿信息的混合物,其中必须提取胎儿部分以计算胎儿的氧饱和度。然而,分离母体和胎儿成分的能力高度依赖于物理系统的生理和结构参数,因此很难在长时间内稳健地提取患者的胎儿信号。在这项工作中,我们提出了一种情境感知传感方法,该方法利用有关物理系统(生理、空间和时间)的附加信息来提取胎儿信号。它通过使用易于测量的母亲生理参数来减少母亲的影响,结合数据融合技术来结合来自多个探测器的空间信息,并利用历史数据点来改进和验证胎儿信号的估计。通过对怀孕绵羊进行体内测量的实验评估,支持了所提出方法的有效性。
{"title":"Contextually-aware Fetal Sensing in Transabdominal Fetal Pulse Oximetry","authors":"Daniel D. Fong, Kourosh Vali, S. Ghiasi","doi":"10.1109/ICCPS48487.2020.00019","DOIUrl":"https://doi.org/10.1109/ICCPS48487.2020.00019","url":null,"abstract":"Transabdominal fetal pulse oximetry (TFO) is a noninvasive technique that can provide physicians with a convenient measure of fetal oxygen saturation. This is accomplished by sending a known light intensity signal towards the mother’s abdomen, where it is modified by the maternal and fetal tissues, and observed some distance away. The measured signal, captured by a photodetector, contains a mixture of both maternal and fetal information, where the fetal portion must be extracted to calculate the fetal oxygen saturation. However, the ability to decouple the maternal and fetal components is highly dependent on the physiological and structural parameters of the physical system, making it difficult to robustly extract the fetal signal across patients over a long-period of time. In this work, we propose a contextually-aware sensing approach that utilizes additional information about the physical system (physiological, spatial, and temporal) to extract the fetal signal. It does this by using easily-measurable parameters of the mother’s physiology to reduce the maternal impact, incorporating data fusion techniques to combine spatial information from multiple detectors, and utilizing historical data points to improve and validate the fetal signal estimates. The efficacy of the proposed approach is supported by experimental evaluation using in vivo measurements captured on pregnant sheep.","PeriodicalId":158690,"journal":{"name":"2020 ACM/IEEE 11th International Conference on Cyber-Physical Systems (ICCPS)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117013293","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
On-Line Supervisory Control for Surveillance under Partial Observation with scLTL Specifications 基于scLTL规范的部分观测监视的在线监视控制
Pub Date : 2020-04-01 DOI: 10.1109/ICCPS48487.2020.00028
Ami Sakakibara, T. Ushio
Linear temporal logic (LTL) [1] is a formal language with rich expressibility and provides a formal description of complex task specifications for robots. In a surveillance problem, for example, mobile robots move around the target environment and collect data with attached sensors. In this abstract, we consider a control problem of a mobile robot working for a surveillance mission. We apply supervisory control to enforce the high-level behavior of the robot defined in an abstracted model [2] to satisfy a given syntactically cosafe LTL (scLTL) specification [3] . We extend the method proposed in [4] to the case under partial observation.
线性时序逻辑(Linear temporal logic, LTL)[1]是一种具有丰富可表达性的形式化语言,为机器人复杂的任务规范提供形式化描述。例如,在监控问题中,移动机器人在目标环境中移动,并通过附加的传感器收集数据。在这个摘要中,我们考虑了一个执行监视任务的移动机器人的控制问题。我们应用监督控制来强制在抽象模型[2]中定义的机器人的高级行为,以满足给定的语法安全LTL (scLTL)规范[3]。我们将[4]中提出的方法推广到部分观测的情况。
{"title":"On-Line Supervisory Control for Surveillance under Partial Observation with scLTL Specifications","authors":"Ami Sakakibara, T. Ushio","doi":"10.1109/ICCPS48487.2020.00028","DOIUrl":"https://doi.org/10.1109/ICCPS48487.2020.00028","url":null,"abstract":"Linear temporal logic (LTL) [1] is a formal language with rich expressibility and provides a formal description of complex task specifications for robots. In a surveillance problem, for example, mobile robots move around the target environment and collect data with attached sensors. In this abstract, we consider a control problem of a mobile robot working for a surveillance mission. We apply supervisory control to enforce the high-level behavior of the robot defined in an abstracted model [2] to satisfy a given syntactically cosafe LTL (scLTL) specification [3] . We extend the method proposed in [4] to the case under partial observation.","PeriodicalId":158690,"journal":{"name":"2020 ACM/IEEE 11th International Conference on Cyber-Physical Systems (ICCPS)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125112232","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Acoustic Side Channel Attack Against DNA Synthesis Machines: Poster Abstract 声学侧通道攻击DNA合成机:海报摘要
Pub Date : 2020-04-01 DOI: 10.1109/ICCPS48487.2020.00026
Sina Faezi, Sujit Rokka Chhetri, A. Malawade, J. Chaput, William H. Grover, P. Brisk, M. A. Faruque
Synthetic DNA molecules play an essential role in genomics research and are a promising, high-capacity data storage medium. Currently, researchers use automated DNA synthesizers to custom-build sequences of oligonucleotides (short DNA strands) using the nucleobases: Adenine (A), Guanine (G), Cytosine (C), and Thymine (T). Research laboratories invest large amounts of capital to engineer unique oligonucleotide sequences. In our work, we demonstrate the vulnerability of commonly used DNA synthesizers to acoustic side-channel attacks, where confidentiality can be breached to steal precious DNA sequences. We introduce a novel methodology to reverse engineer the acoustic noise generated by the DNA synthesizer and extract the type and order of the nucleobases delivered to the output. To the best of our knowledge, this is the first work which highlights the possibility of physical-to-cyber attacks in DNA synthesis technologies.
合成DNA分子在基因组学研究中起着至关重要的作用,是一种有前途的大容量数据存储介质。目前,研究人员使用自动DNA合成器使用核碱基:腺嘌呤(A),鸟嘌呤(G),胞嘧啶(C)和胸腺嘧啶(T)来定制构建寡核苷酸(短DNA链)序列。研究实验室投入大量资金来设计独特的寡核苷酸序列。在我们的工作中,我们证明了常用的DNA合成器对声学侧信道攻击的脆弱性,在这种攻击中,机密性可以被破坏以窃取珍贵的DNA序列。我们介绍了一种新的方法来逆向工程由DNA合成器产生的噪声和提取的类型和顺序的核碱基交付到输出。据我们所知,这是第一个强调DNA合成技术中物理对网络攻击可能性的工作。
{"title":"Acoustic Side Channel Attack Against DNA Synthesis Machines: Poster Abstract","authors":"Sina Faezi, Sujit Rokka Chhetri, A. Malawade, J. Chaput, William H. Grover, P. Brisk, M. A. Faruque","doi":"10.1109/ICCPS48487.2020.00026","DOIUrl":"https://doi.org/10.1109/ICCPS48487.2020.00026","url":null,"abstract":"Synthetic DNA molecules play an essential role in genomics research and are a promising, high-capacity data storage medium. Currently, researchers use automated DNA synthesizers to custom-build sequences of oligonucleotides (short DNA strands) using the nucleobases: Adenine (A), Guanine (G), Cytosine (C), and Thymine (T). Research laboratories invest large amounts of capital to engineer unique oligonucleotide sequences. In our work, we demonstrate the vulnerability of commonly used DNA synthesizers to acoustic side-channel attacks, where confidentiality can be breached to steal precious DNA sequences. We introduce a novel methodology to reverse engineer the acoustic noise generated by the DNA synthesizer and extract the type and order of the nucleobases delivered to the output. To the best of our knowledge, this is the first work which highlights the possibility of physical-to-cyber attacks in DNA synthesis technologies.","PeriodicalId":158690,"journal":{"name":"2020 ACM/IEEE 11th International Conference on Cyber-Physical Systems (ICCPS)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127699082","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
WiP Abstract: Mobility-based Load Balancing for IoT-enabled Devices in Smart Grids 摘要:智能电网中物联网设备基于移动性的负载均衡
Pub Date : 2020-04-01 DOI: 10.1109/ICCPS48487.2020.00029
N. Shivaraman, Jakob Fittler, Saravanan Ramanathan, A. Easwaran, S. Steinhorst
There is an unprecedented load variability in the smart grids due to device (e.g. electric vehicles) mobility across different grid-locations. As a consequence, utility service providers have started exploring solutions such as dynamic pricing mechanisms, grid extensions and redistribution across micro-grids. However, most of these solutions do not exploit the transient nature of mobile devices. In this work, we propose an alternate mobility-based load balancing mechanism that exploits device-level flexibility. With recent advancements in Internet of Things (IoT) technology, we assume these devices to be equipped with IoT capabilities. We present an abstract model to capture the demand from these IoT-enabled devices in the form of a utility function. Our objective is to cater to the demand by incentivising device mobility without exceeding the peak load capacity across all grid-locations such that the overall utility of the devices is maximized.
由于设备(如电动汽车)在不同电网位置的移动性,智能电网中存在前所未有的负载可变性。因此,公用事业服务提供商已经开始探索动态定价机制、电网扩展和微电网再分配等解决方案。然而,这些解决方案中的大多数都没有利用移动设备的瞬态特性。在这项工作中,我们提出了一种利用设备级灵活性的基于移动性的负载平衡机制。随着物联网(IoT)技术的最新进步,我们假设这些设备配备了物联网功能。我们提出了一个抽象模型,以实用函数的形式捕获这些支持物联网的设备的需求。我们的目标是通过在不超过所有电网位置的峰值负载能力的情况下激励设备移动性来满足需求,从而使设备的整体效用最大化。
{"title":"WiP Abstract: Mobility-based Load Balancing for IoT-enabled Devices in Smart Grids","authors":"N. Shivaraman, Jakob Fittler, Saravanan Ramanathan, A. Easwaran, S. Steinhorst","doi":"10.1109/ICCPS48487.2020.00029","DOIUrl":"https://doi.org/10.1109/ICCPS48487.2020.00029","url":null,"abstract":"There is an unprecedented load variability in the smart grids due to device (e.g. electric vehicles) mobility across different grid-locations. As a consequence, utility service providers have started exploring solutions such as dynamic pricing mechanisms, grid extensions and redistribution across micro-grids. However, most of these solutions do not exploit the transient nature of mobile devices. In this work, we propose an alternate mobility-based load balancing mechanism that exploits device-level flexibility. With recent advancements in Internet of Things (IoT) technology, we assume these devices to be equipped with IoT capabilities. We present an abstract model to capture the demand from these IoT-enabled devices in the form of a utility function. Our objective is to cater to the demand by incentivising device mobility without exceeding the peak load capacity across all grid-locations such that the overall utility of the devices is maximized.","PeriodicalId":158690,"journal":{"name":"2020 ACM/IEEE 11th International Conference on Cyber-Physical Systems (ICCPS)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126698418","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
WiP Abstract: Detection of False Injection Attacks Based on LTL for Fallback Control 摘要:基于LTL的回退控制假注入攻击检测
Pub Date : 2020-04-01 DOI: 10.1109/ICCPS48487.2020.00030
Naomi Kuze, Ami Sakakibara, T. Ushio
As the development of cyber-physical systems, it becomes important to consider security for physical systems, not only for cyber systems. In this paper, we focus on an UAV control system as an example of cyber-physical systems, and propose an UAV control system with fallback control for avoiding false injection attacks. Moreover, for improving both the safety and availability of the system, we proposed an attack detector based on the runtime verification with the LTL.
随着网络物理系统的发展,物理系统的安全变得越来越重要,而不仅仅是网络系统的安全。本文以网络物理系统中的无人机控制系统为例,提出了一种具有回退控制的无人机控制系统,以避免误注入攻击。此外,为了提高系统的安全性和可用性,我们提出了一种基于LTL运行时验证的攻击检测器。
{"title":"WiP Abstract: Detection of False Injection Attacks Based on LTL for Fallback Control","authors":"Naomi Kuze, Ami Sakakibara, T. Ushio","doi":"10.1109/ICCPS48487.2020.00030","DOIUrl":"https://doi.org/10.1109/ICCPS48487.2020.00030","url":null,"abstract":"As the development of cyber-physical systems, it becomes important to consider security for physical systems, not only for cyber systems. In this paper, we focus on an UAV control system as an example of cyber-physical systems, and propose an UAV control system with fallback control for avoiding false injection attacks. Moreover, for improving both the safety and availability of the system, we proposed an attack detector based on the runtime verification with the LTL.","PeriodicalId":158690,"journal":{"name":"2020 ACM/IEEE 11th International Conference on Cyber-Physical Systems (ICCPS)","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115631255","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
期刊
2020 ACM/IEEE 11th International Conference on Cyber-Physical Systems (ICCPS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1