首页 > 最新文献

2018 ACM/IEEE 9th International Conference on Cyber-Physical Systems (ICCPS)最新文献

英文 中文
SoH Aware Battery Management Optimization on Decentralized Energy Network 分布式能源网络中SoH感知的电池管理优化
Pub Date : 2018-04-11 DOI: 10.1109/ICCPS.2018.00042
Daichi Watari, Ittetsu Taniguchi, T. Onoye
The battery degradation is serious problem for the modern electrical systems. This paper proposes State-of-Health (SoH) aware battery management optimization method on decentralized energy network. The power distribution problem is often solved with mixed integer programming (MIP), and proposed formulation takes into account the SoH model. Our poster shows the details and the effectiveness of proposed method.
电池退化是现代电力系统面临的一个严重问题。提出了一种基于健康状态感知的分散能源网络电池管理优化方法。功率分配问题通常用混合整数规划(MIP)来解决,本文提出的公式考虑了SoH模型。我们的海报展示了所提出方法的细节和有效性。
{"title":"SoH Aware Battery Management Optimization on Decentralized Energy Network","authors":"Daichi Watari, Ittetsu Taniguchi, T. Onoye","doi":"10.1109/ICCPS.2018.00042","DOIUrl":"https://doi.org/10.1109/ICCPS.2018.00042","url":null,"abstract":"The battery degradation is serious problem for the modern electrical systems. This paper proposes State-of-Health (SoH) aware battery management optimization method on decentralized energy network. The power distribution problem is often solved with mixed integer programming (MIP), and proposed formulation takes into account the SoH model. Our poster shows the details and the effectiveness of proposed method.","PeriodicalId":199062,"journal":{"name":"2018 ACM/IEEE 9th International Conference on Cyber-Physical Systems (ICCPS)","volume":"87 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129005391","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
WiP Abstract: Underwater AUV Localization with Refraction Consideration 摘要:考虑折射的水下AUV定位
Pub Date : 2018-04-01 DOI: 10.1109/iccps.2018.00040
Jiajun Shen, Xueli Fan, Qixin Wang
The aim of this paper is to propose an novel underwater localization scheme considering acoustic refractions. Simulation results shows that our scheme is superior than some other schemes in deep water contexts.
本文的目的是提出一种考虑声折射的水下定位方案。仿真结果表明,该方案在深水环境下优于其他方案。
{"title":"WiP Abstract: Underwater AUV Localization with Refraction Consideration","authors":"Jiajun Shen, Xueli Fan, Qixin Wang","doi":"10.1109/iccps.2018.00040","DOIUrl":"https://doi.org/10.1109/iccps.2018.00040","url":null,"abstract":"The aim of this paper is to propose an novel underwater localization scheme considering acoustic refractions. Simulation results shows that our scheme is superior than some other schemes in deep water contexts.","PeriodicalId":199062,"journal":{"name":"2018 ACM/IEEE 9th International Conference on Cyber-Physical Systems (ICCPS)","volume":"114 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123366364","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
WiP Abstract: KRS-DGIST: A Resilient CPS Testbed for Radio-Based Train Control 摘要:KRS-DGIST:基于无线电的列车控制弹性CPS试验台
Pub Date : 2018-04-01 DOI: 10.1109/iccps.2018.00043
Yuchang Won, B. Yu, Jaegeun Park, I. Park, Haegeon Jeong, Jeanseong Baik, Kyungtae Kang, Insup Lee, Kyung-Joon Park, Y. Eun
This paper presents an architecture for cyber-physical systems resilient against external attacks and internal faults. The target CPS consists of multiple physical systems equipped with local embedded systems, a supervision module that oversees operations of the physical systems, and communication network connecting each physical system to the supervision module. We give an instantiation of the architecture on a radio-based train control system to demonstrate the resiliency under various safety critical scenarios. The testbed entitled KRS-DGIST includes a commercial train control and supervision software deployed in the Philippines. The railway installed sensors and other mechanisms are implemented reflecting the actual train control and supervision system, and the dynamics of the trains is computer simulated. Demonstrations are given with attacks on sensors, communication network, and embedded systems.
本文提出了一种能够抵御外部攻击和内部故障的网络物理系统体系结构。目标CPS由多个配备本地嵌入式系统的物理系统、监督物理系统运行的监管模块、连接每个物理系统与监管模块的通信网络组成。我们给出了一个基于无线电的列车控制系统的实例,以展示在各种安全关键场景下的弹性。名为KRS-DGIST的测试平台包括部署在菲律宾的商业列车控制和监督软件。在铁路上安装传感器和其他机构,以反映实际的列车控制和监视系统,并对列车的动力学进行计算机模拟。演示了对传感器、通信网络和嵌入式系统的攻击。
{"title":"WiP Abstract: KRS-DGIST: A Resilient CPS Testbed for Radio-Based Train Control","authors":"Yuchang Won, B. Yu, Jaegeun Park, I. Park, Haegeon Jeong, Jeanseong Baik, Kyungtae Kang, Insup Lee, Kyung-Joon Park, Y. Eun","doi":"10.1109/iccps.2018.00043","DOIUrl":"https://doi.org/10.1109/iccps.2018.00043","url":null,"abstract":"This paper presents an architecture for cyber-physical systems resilient against external attacks and internal faults. The target CPS consists of multiple physical systems equipped with local embedded systems, a supervision module that oversees operations of the physical systems, and communication network connecting each physical system to the supervision module. We give an instantiation of the architecture on a radio-based train control system to demonstrate the resiliency under various safety critical scenarios. The testbed entitled KRS-DGIST includes a commercial train control and supervision software deployed in the Philippines. The railway installed sensors and other mechanisms are implemented reflecting the actual train control and supervision system, and the dynamics of the trains is computer simulated. Demonstrations are given with attacks on sensors, communication network, and embedded systems.","PeriodicalId":199062,"journal":{"name":"2018 ACM/IEEE 9th International Conference on Cyber-Physical Systems (ICCPS)","volume":"281 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120879870","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Towards a Framework for Realizable Safety Critical Control through Active Set Invariance 基于主动集不变性的可实现安全临界控制框架
Pub Date : 2018-04-01 DOI: 10.1109/ICCPS.2018.00018
Thomas Gurriet, Andrew W. Singletary, Jake Reher, L. Ciarletta, E. Feron, A. Ames
This paper presents initial results towards a realizable framework for the safety critical controlled invariance of cyber-physical systems. The main contribution of this paper is the development of a control barrier function based methodology which can be used to enforce set invariance on systems in the presence of non-linear disturbances and uncertainty. The first part of this work is a review of the current methods available for finding viable sets and how they are linked to practical choices regarding safety. Their limitations and directions towards improvements when it comes to handling model uncertainty are also highlighted. The second part of this work is the formulation of a condition which can guarantee set invariance in the presence of generic uncertain in the dynamics. An associated optimization problem to enforce that condition is proposed and a method to convexify the problem and make it solvable in real-time is formally presented. The effectiveness of the proposed framework is illustrated experimentally on a two-wheeled inverted pendulum.
本文提出了一个可实现的网络物理系统安全临界控制不变性框架的初步结果。本文的主要贡献是开发了一种基于控制障碍函数的方法,该方法可用于在存在非线性干扰和不确定性的系统上强制集不变性。这项工作的第一部分是对现有方法的回顾,这些方法可用于寻找可行的集合,以及如何将它们与有关安全的实际选择联系起来。当涉及到处理模型不确定性时,它们的局限性和改进方向也被强调。本工作的第二部分是在动力学中存在一般不确定性时保证集合不变性的条件的表述。提出了实现该条件的关联优化问题,并形式化地提出了将问题凸化并使其实时可解的方法。在两轮倒立摆实验上验证了该框架的有效性。
{"title":"Towards a Framework for Realizable Safety Critical Control through Active Set Invariance","authors":"Thomas Gurriet, Andrew W. Singletary, Jake Reher, L. Ciarletta, E. Feron, A. Ames","doi":"10.1109/ICCPS.2018.00018","DOIUrl":"https://doi.org/10.1109/ICCPS.2018.00018","url":null,"abstract":"This paper presents initial results towards a realizable framework for the safety critical controlled invariance of cyber-physical systems. The main contribution of this paper is the development of a control barrier function based methodology which can be used to enforce set invariance on systems in the presence of non-linear disturbances and uncertainty. The first part of this work is a review of the current methods available for finding viable sets and how they are linked to practical choices regarding safety. Their limitations and directions towards improvements when it comes to handling model uncertainty are also highlighted. The second part of this work is the formulation of a condition which can guarantee set invariance in the presence of generic uncertain in the dynamics. An associated optimization problem to enforce that condition is proposed and a method to convexify the problem and make it solvable in real-time is formally presented. The effectiveness of the proposed framework is illustrated experimentally on a two-wheeled inverted pendulum.","PeriodicalId":199062,"journal":{"name":"2018 ACM/IEEE 9th International Conference on Cyber-Physical Systems (ICCPS)","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123020360","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 86
Learning and Control Using Gaussian Processes 使用高斯过程的学习和控制
Pub Date : 2018-04-01 DOI: 10.1109/iccps.2018.00022
Achin Jain, Truong X. Nghiem, M. Morari, R. Mangharam
Building physics-based models of complex physical systems like buildings and chemical plants is extremely cost and time prohibitive for applications such as real-time optimal control, production planning and supply chain logistics. Machine learning algorithms can reduce this cost and time complexity, and are, consequently, more scalable for large-scale physical systems. However, there are many practical challenges that must be addressed before employing machine learning for closed-loop control. This paper proposes the use of Gaussian Processes (GP) for learning control-oriented models: (1) We develop methods for the optimal experiment design (OED) of functional tests to learn models of a physical system, subject to stringent operational constraints and limited availability of the system. Using a Bayesian approach with GP, our methods seek to select the most informative data for optimally updating an existing model. (2) We also show that black-box GP models can be used for receding horizon optimal control with probabilistic guarantees on constraint satisfaction through chance constraints. (3) We further propose an online method for continuously improving the GP model in closed-loop with a real-time controller. Our methods are demonstrated and validated in a case study of building energy control and Demand Response.
对于实时优化控制、生产计划和供应链物流等应用来说,为建筑物和化工厂等复杂物理系统建立基于物理的模型是非常昂贵和费时的。机器学习算法可以降低这种成本和时间复杂性,因此对于大规模物理系统来说更具可扩展性。然而,在将机器学习用于闭环控制之前,必须解决许多实际挑战。本文提出使用高斯过程(GP)来学习面向控制的模型:(1)我们开发了功能测试的最佳实验设计(OED)方法来学习物理系统的模型,该模型受严格的操作约束和系统的有限可用性。使用贝叶斯方法与GP,我们的方法寻求选择最具信息量的数据,以优化更新现有模型。(2)我们还证明了黑箱GP模型可以用于通过机会约束满足概率保证的后退视界最优控制。(3)进一步提出了一种利用实时控制器对GP模型进行闭环持续改进的在线方法。我们的方法在建筑能源控制和需求响应的案例研究中得到了证明和验证。
{"title":"Learning and Control Using Gaussian Processes","authors":"Achin Jain, Truong X. Nghiem, M. Morari, R. Mangharam","doi":"10.1109/iccps.2018.00022","DOIUrl":"https://doi.org/10.1109/iccps.2018.00022","url":null,"abstract":"Building physics-based models of complex physical systems like buildings and chemical plants is extremely cost and time prohibitive for applications such as real-time optimal control, production planning and supply chain logistics. Machine learning algorithms can reduce this cost and time complexity, and are, consequently, more scalable for large-scale physical systems. However, there are many practical challenges that must be addressed before employing machine learning for closed-loop control. This paper proposes the use of Gaussian Processes (GP) for learning control-oriented models: (1) We develop methods for the optimal experiment design (OED) of functional tests to learn models of a physical system, subject to stringent operational constraints and limited availability of the system. Using a Bayesian approach with GP, our methods seek to select the most informative data for optimally updating an existing model. (2) We also show that black-box GP models can be used for receding horizon optimal control with probabilistic guarantees on constraint satisfaction through chance constraints. (3) We further propose an online method for continuously improving the GP model in closed-loop with a real-time controller. Our methods are demonstrated and validated in a case study of building energy control and Demand Response.","PeriodicalId":199062,"journal":{"name":"2018 ACM/IEEE 9th International Conference on Cyber-Physical Systems (ICCPS)","volume":"126 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124340116","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 57
Demo Abstract: An Industrial Control System Testbed for the Encrypted Controller 摘要:一种工业控制系统加密控制器试验台
Pub Date : 2018-04-01 DOI: 10.1109/iccps.2018.00045
Xing Li, Mengxiang Liu, Rui Zhang, Peng Cheng, Jiming Chen
The encrypted controller is a novel and promising approach for enhancing the security of industrial control systems [1]. This approach encrypts both the signals that transmitted over communication channels and the control law, so as to protect all information of a plant and its controller from attackers. However, in spite of considerable research efforts [2]–[12], the encrypted controller is still quite far from its implementation and application in industrial control systems. In-depth experimental studies are necessary for bridging the gap between theory and application of the encrypted controller. In this demonstration, we present an industrial control system testbed for experimental studies of the encrypted controller. Moreover, we carry out an experimental study that improves and evaluates the security of the industrial control system which comprises the encrypted controller using the testbed.
加密控制器是提高工业控制系统安全性的一种新颖而有前途的方法[1]。该方法对通过通信信道传输的信号和控制律进行加密,从而保护设备及其控制器的所有信息不受攻击者的攻击。然而,尽管进行了大量的研究工作[2]-[12],但加密控制器离其在工业控制系统中的实现和应用还有很长的路要走。为了弥合加密控制器理论与应用之间的差距,有必要进行深入的实验研究。在这个演示中,我们提出了一个工业控制系统测试平台,用于加密控制器的实验研究。此外,我们还进行了实验研究,以提高和评估由加密控制器组成的工业控制系统的安全性。
{"title":"Demo Abstract: An Industrial Control System Testbed for the Encrypted Controller","authors":"Xing Li, Mengxiang Liu, Rui Zhang, Peng Cheng, Jiming Chen","doi":"10.1109/iccps.2018.00045","DOIUrl":"https://doi.org/10.1109/iccps.2018.00045","url":null,"abstract":"The encrypted controller is a novel and promising approach for enhancing the security of industrial control systems [1]. This approach encrypts both the signals that transmitted over communication channels and the control law, so as to protect all information of a plant and its controller from attackers. However, in spite of considerable research efforts [2]–[12], the encrypted controller is still quite far from its implementation and application in industrial control systems. In-depth experimental studies are necessary for bridging the gap between theory and application of the encrypted controller. In this demonstration, we present an industrial control system testbed for experimental studies of the encrypted controller. Moreover, we carry out an experimental study that improves and evaluates the security of the industrial control system which comprises the encrypted controller using the testbed.","PeriodicalId":199062,"journal":{"name":"2018 ACM/IEEE 9th International Conference on Cyber-Physical Systems (ICCPS)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125638189","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Re-Thinking EEG-Based Non-Invasive Brain Interfaces: Modeling and Analysis 重新思考基于脑电图的非侵入性脑接口:建模和分析
Pub Date : 2018-03-27 DOI: 10.1109/ICCPS.2018.00034
Gaurav Gupta, S. Pequito, P. Bogdan
Brain interfaces are cyber-physical systems that aim to harvest information from the (physical) brain through sensing mechanisms, extract information about the underlying processes, and decide/actuate accordingly. Nonetheless, the brain interfaces are still in their infancy, but reaching to their maturity quickly as several initiatives are released to push forward their development (e.g., NeuraLink by Elon Musk and `typing-by-brain' by Facebook). This has motivated us to revisit the design of EEG-based non-invasive brain interfaces. Specifically, current methodologies entail a highly skilled neuro-functional approach and evidence-based a priori knowledge about specific signal features and their interpretation from a neuro-physiological point of view. Hereafter, we propose to demystify such approaches, as we propose to leverage new time-varying complex network models that equip us with a fractal dynamical characterization of the underlying processes. Subsequently, the parameters of the proposed complex network models can be explained from a system's perspective, and, consecutively, used for classification using machine learning algorithms and/or actuation laws determined using control system's theory. Besides, the proposed system identification methods and techniques have computational complexities comparable with those currently used in EEG-based brain interfaces, which enable comparable online performances. Furthermore, we foresee that the proposed models and approaches are also valid using other invasive and non-invasive technologies. Finally, we illustrate and experimentally evaluate this approach on real EEG-datasets to assess and validate the proposed methodology. The classification accuracies are high even on having less number of training samples.
脑接口是一种网络物理系统,旨在通过感知机制从(物理)大脑中获取信息,提取有关潜在过程的信息,并据此做出决定/执行。尽管如此,大脑接口仍处于起步阶段,但随着几项推动其发展的计划的发布(例如埃隆·马斯克的NeuraLink和Facebook的“大脑打字”),它们很快就会走向成熟。这促使我们重新审视基于脑电图的非侵入性脑接口的设计。具体来说,当前的方法需要高度熟练的神经功能方法和基于证据的关于特定信号特征的先验知识,以及从神经生理学的角度对其进行解释。此后,我们建议揭开这些方法的神秘面纱,因为我们建议利用新的时变复杂网络模型,使我们具备潜在过程的分形动态特征。随后,可以从系统的角度解释所提出的复杂网络模型的参数,并依次使用机器学习算法和/或使用控制系统理论确定的驱动定律进行分类。此外,所提出的系统识别方法和技术的计算复杂性可与目前使用的基于脑电图的脑接口相媲美,从而实现类似的在线性能。此外,我们预计所提出的模型和方法也适用于其他侵入性和非侵入性技术。最后,我们在真实的脑电图数据集上对该方法进行了演示和实验评估,以评估和验证所提出的方法。即使在训练样本较少的情况下,分类准确率也很高。
{"title":"Re-Thinking EEG-Based Non-Invasive Brain Interfaces: Modeling and Analysis","authors":"Gaurav Gupta, S. Pequito, P. Bogdan","doi":"10.1109/ICCPS.2018.00034","DOIUrl":"https://doi.org/10.1109/ICCPS.2018.00034","url":null,"abstract":"Brain interfaces are cyber-physical systems that aim to harvest information from the (physical) brain through sensing mechanisms, extract information about the underlying processes, and decide/actuate accordingly. Nonetheless, the brain interfaces are still in their infancy, but reaching to their maturity quickly as several initiatives are released to push forward their development (e.g., NeuraLink by Elon Musk and `typing-by-brain' by Facebook). This has motivated us to revisit the design of EEG-based non-invasive brain interfaces. Specifically, current methodologies entail a highly skilled neuro-functional approach and evidence-based a priori knowledge about specific signal features and their interpretation from a neuro-physiological point of view. Hereafter, we propose to demystify such approaches, as we propose to leverage new time-varying complex network models that equip us with a fractal dynamical characterization of the underlying processes. Subsequently, the parameters of the proposed complex network models can be explained from a system's perspective, and, consecutively, used for classification using machine learning algorithms and/or actuation laws determined using control system's theory. Besides, the proposed system identification methods and techniques have computational complexities comparable with those currently used in EEG-based brain interfaces, which enable comparable online performances. Furthermore, we foresee that the proposed models and approaches are also valid using other invasive and non-invasive technologies. Finally, we illustrate and experimentally evaluate this approach on real EEG-datasets to assess and validate the proposed methodology. The classification accuracies are high even on having less number of training samples.","PeriodicalId":199062,"journal":{"name":"2018 ACM/IEEE 9th International Conference on Cyber-Physical Systems (ICCPS)","volume":"205 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132152281","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 29
Cloaking the Clock: Emulating Clock Skew in Controller Area Networks 掩盖时钟:控制器局域网中时钟偏差的仿真
Pub Date : 2017-10-07 DOI: 10.1109/ICCPS.2018.00012
Sagong Uk Sang, Xuhang Ying, Andrew Clark, L. Bushnell, R. Poovendran
Automobiles are equipped with Electronic Control Units (ECUs) that communicate via in-vehicle network protocol standards such as the Controller Area Network (CAN). These protocols were designed under the assumption that separating in-vehicle communications from external networks is sufficient for protection against cyber attacks. This assumption, however, has been shown to be invalid by recent attacks in which adversaries were able to infiltrate the in-vehicle network. Motivated by these attacks, intrusion detection systems (IDSs) have been proposed for in-vehicle networks that attempt to detect attacks by exploiting physical properties such as clock skew of an ECU. In this paper, we propose the cloaking attack, an intelligent masquerade attack in which an adversary modifies the timing of transmitted messages to match the clock skew of a targeted ECU. The attack leverages the fact that, while the clock skew is a physical property of each ECU that cannot be changed by the adversary, the estimation of the clock skew by other ECUs is based on the timing of network traffic, which, being a cyber component only, can be modified by an adversary. We implement the proposed cloaking attack and test it on two IDSs, namely, the current state-of-the-art IDS and its adaptation to the widely-used Network Time Protocol (NTP). We implement the cloaking attack on two hardware testbeds, a prototype and a real vehicle, and show that it is able to deceive both IDSs. We also introduce a new metric called the Maximum Slackness Index to quantify the effectiveness of a clock skew-based IDS in detecting masquerade attacks when the adversary is unable to precisely match the clock skew of the targeted ECU.
汽车配备了通过控制器局域网(CAN)等车载网络协议标准进行通信的电子控制单元(ecu)。这些协议的设计是基于这样的假设:将车内通信与外部网络分离,足以抵御网络攻击。然而,这种假设在最近的攻击中已经被证明是无效的,攻击者能够渗透到车载网络中。在这些攻击的推动下,入侵检测系统(ids)被提议用于车载网络,试图通过利用ECU的时钟倾斜等物理属性来检测攻击。在本文中,我们提出了隐形攻击,这是一种智能伪装攻击,攻击者修改传输消息的时间以匹配目标ECU的时钟倾斜。攻击利用了这样一个事实,即时钟偏差是每个ECU的物理属性,攻击者无法改变它,而其他ECU对时钟偏差的估计是基于网络流量的时间,而网络流量只是一个网络组件,可以被攻击者修改。我们实现了所提出的隐形攻击,并在两个IDS上进行了测试,即当前最先进的IDS及其对广泛使用的网络时间协议(NTP)的适应。我们在原型机和真实车辆两个硬件测试平台上实现了隐身攻击,并表明它能够欺骗两个入侵防御系统。我们还引入了一个称为最大松弛指数的新指标,用于量化基于时钟偏差的IDS在检测伪装攻击时的有效性,当对手无法精确匹配目标ECU的时钟偏差时。
{"title":"Cloaking the Clock: Emulating Clock Skew in Controller Area Networks","authors":"Sagong Uk Sang, Xuhang Ying, Andrew Clark, L. Bushnell, R. Poovendran","doi":"10.1109/ICCPS.2018.00012","DOIUrl":"https://doi.org/10.1109/ICCPS.2018.00012","url":null,"abstract":"Automobiles are equipped with Electronic Control Units (ECUs) that communicate via in-vehicle network protocol standards such as the Controller Area Network (CAN). These protocols were designed under the assumption that separating in-vehicle communications from external networks is sufficient for protection against cyber attacks. This assumption, however, has been shown to be invalid by recent attacks in which adversaries were able to infiltrate the in-vehicle network. Motivated by these attacks, intrusion detection systems (IDSs) have been proposed for in-vehicle networks that attempt to detect attacks by exploiting physical properties such as clock skew of an ECU. In this paper, we propose the cloaking attack, an intelligent masquerade attack in which an adversary modifies the timing of transmitted messages to match the clock skew of a targeted ECU. The attack leverages the fact that, while the clock skew is a physical property of each ECU that cannot be changed by the adversary, the estimation of the clock skew by other ECUs is based on the timing of network traffic, which, being a cyber component only, can be modified by an adversary. We implement the proposed cloaking attack and test it on two IDSs, namely, the current state-of-the-art IDS and its adaptation to the widely-used Network Time Protocol (NTP). We implement the cloaking attack on two hardware testbeds, a prototype and a real vehicle, and show that it is able to deceive both IDSs. We also introduce a new metric called the Maximum Slackness Index to quantify the effectiveness of a clock skew-based IDS in detecting masquerade attacks when the adversary is unable to precisely match the clock skew of the targeted ECU.","PeriodicalId":199062,"journal":{"name":"2018 ACM/IEEE 9th International Conference on Cyber-Physical Systems (ICCPS)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125350983","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 69
Parameter Optimization in Control Software Using Statistical Fault Localization Techniques 基于统计故障定位技术的控制软件参数优化
Pub Date : 2017-10-05 DOI: 10.1109/ICCPS.2018.00029
Jyotirmoy V. Deshmukh, Xiaoqing Jin, R. Majumdar, Vinayak S. Prabhu
Embedded controllers for cyber-physical systems are often parameterized by look-up maps representing discretizations of continuous functions on metric spaces. For example, a non-linear control action may be represented as a table of pre-computed values, and the output action of the controller for a given input computed by using interpolation. For industrial-scale control systems, several man-hours of effort are spent in tuning the values within the look-up maps. %and sub-optimal performance is often associated with %inappropriate values in look-up maps. Suppose that during testing, the controller code is found to have sub-optimal performance. The parameter fault localization problem asks which parameter values in the code are potential causes of the sub-optimal behavior. We present a statistical parameter fault localization approach based on binary similarity coefficients and set spectra methods. Our approach extends previous work on (traditional) software fault localization to a quantitative setting where the parameters encode continuous functions over a metric space and the program is reactive. We have implemented our approach in a simulation workflow for control systems in Simulink. Given controller code with parameters (including look-up maps), our framework bootstraps the simulation workflow to return a ranked list of map entries which are deemed to have most impact on the performance. On a suite of industrial case studies with seeded errors, our tool was able to precisely identify the location of the errors.
网络物理系统的嵌入式控制器通常通过表示度量空间上连续函数离散化的查找映射来参数化。例如,非线性控制动作可以表示为预先计算值的表,而控制器对给定输入的输出动作通过使用插值计算。对于工业规模的控制系统,需要花费几个工时来调整查找图中的值。%和次优性能通常与查找映射中的%不适当值相关联。假设在测试过程中,控制器代码被发现具有次优性能。参数故障定位问题询问代码中的哪些参数值是导致次优行为的潜在原因。提出了一种基于二值相似系数和集谱方法的统计参数故障定位方法。我们的方法将以前的(传统)软件故障定位工作扩展到定量设置,其中参数在度量空间上编码连续函数,程序是反应性的。我们已经在Simulink的控制系统仿真工作流中实现了我们的方法。给定带有参数的控制器代码(包括查找映射),我们的框架引导仿真工作流返回被认为对性能影响最大的映射条目的排序列表。在一系列带有种子错误的工业案例研究中,我们的工具能够精确地识别错误的位置。
{"title":"Parameter Optimization in Control Software Using Statistical Fault Localization Techniques","authors":"Jyotirmoy V. Deshmukh, Xiaoqing Jin, R. Majumdar, Vinayak S. Prabhu","doi":"10.1109/ICCPS.2018.00029","DOIUrl":"https://doi.org/10.1109/ICCPS.2018.00029","url":null,"abstract":"Embedded controllers for cyber-physical systems are often parameterized by look-up maps representing discretizations of continuous functions on metric spaces. For example, a non-linear control action may be represented as a table of pre-computed values, and the output action of the controller for a given input computed by using interpolation. For industrial-scale control systems, several man-hours of effort are spent in tuning the values within the look-up maps. %and sub-optimal performance is often associated with %inappropriate values in look-up maps. Suppose that during testing, the controller code is found to have sub-optimal performance. The parameter fault localization problem asks which parameter values in the code are potential causes of the sub-optimal behavior. We present a statistical parameter fault localization approach based on binary similarity coefficients and set spectra methods. Our approach extends previous work on (traditional) software fault localization to a quantitative setting where the parameters encode continuous functions over a metric space and the program is reactive. We have implemented our approach in a simulation workflow for control systems in Simulink. Given controller code with parameters (including look-up maps), our framework bootstraps the simulation workflow to return a ranked list of map entries which are deemed to have most impact on the performance. On a suite of industrial case studies with seeded errors, our tool was able to precisely identify the location of the errors.","PeriodicalId":199062,"journal":{"name":"2018 ACM/IEEE 9th International Conference on Cyber-Physical Systems (ICCPS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129863611","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Sound Mixed-Precision Optimization with Rewriting 声音混合精度优化与重写
Pub Date : 2017-07-07 DOI: 10.1109/ICCPS.2018.00028
Eva Darulova, Einar Horn, Saksham Sharma
Finite-precision arithmetic, widely used in embedded systems for numerical calculations, faces an inherent tradeoff between accuracy and efficiency. The points in this tradeoff space are determined, among other factors, by different data types but also evaluation orders. To put it simply, the shorter a precision's bit-length, the larger the roundoff error will be, but the faster the program will run. Similarly, the fewer arithmetic operations the program performs, the faster it will run; however, the effect on the roundoff error is less clear-cut. Manually optimizing the efficiency of finite-precision programs while ensuring that results remain accurate enough is challenging. The unintuitive and discrete nature of finite-precision makes estimation of roundoff errors difficult; furthermore the space of possible data types and evaluation orders is prohibitively large. We present the first fully automated and sound technique and tool for optimizing the performance of floating-point and fixed-point arithmetic kernels. Our technique combines rewriting and mixed-precision tuning. Rewriting searches through different evaluation orders to find one which minimizes the roundoff error at no additional runtime cost. Mixed-precision tuning assigns different finite precisions to different variables and operations and thus provides finer-grained control than uniform precision. We show that when these two techniques are designed and applied together, they can provide higher performance improvements than each alone.
有限精度算法广泛应用于嵌入式系统中进行数值计算,它面临着精度与效率之间的内在权衡。除其他因素外,这个权衡空间中的点由不同的数据类型和求值顺序决定。简单地说,精度的位长度越短,舍入误差就越大,但程序运行速度就越快。同样,程序执行的算术运算越少,运行速度就越快;然而,对舍入误差的影响就不那么明确了。手动优化有限精度程序的效率,同时确保结果保持足够的准确性是具有挑战性的。有限精度的非直观和离散性使得舍入误差的估计变得困难;此外,可能的数据类型和求值顺序的空间非常大。我们提出了第一个完全自动化和完善的技术和工具,用于优化浮点和定点算术内核的性能。我们的技术结合了重写和混合精度调优。重写搜索不同的求值顺序,以找到一个在不增加运行时成本的情况下最小化舍入错误的求值顺序。混合精度调优为不同的变量和操作分配不同的有限精度,从而提供比统一精度更细粒度的控制。我们表明,当这两种技术一起设计和应用时,它们可以提供比单独使用更高的性能改进。
{"title":"Sound Mixed-Precision Optimization with Rewriting","authors":"Eva Darulova, Einar Horn, Saksham Sharma","doi":"10.1109/ICCPS.2018.00028","DOIUrl":"https://doi.org/10.1109/ICCPS.2018.00028","url":null,"abstract":"Finite-precision arithmetic, widely used in embedded systems for numerical calculations, faces an inherent tradeoff between accuracy and efficiency. The points in this tradeoff space are determined, among other factors, by different data types but also evaluation orders. To put it simply, the shorter a precision's bit-length, the larger the roundoff error will be, but the faster the program will run. Similarly, the fewer arithmetic operations the program performs, the faster it will run; however, the effect on the roundoff error is less clear-cut. Manually optimizing the efficiency of finite-precision programs while ensuring that results remain accurate enough is challenging. The unintuitive and discrete nature of finite-precision makes estimation of roundoff errors difficult; furthermore the space of possible data types and evaluation orders is prohibitively large. We present the first fully automated and sound technique and tool for optimizing the performance of floating-point and fixed-point arithmetic kernels. Our technique combines rewriting and mixed-precision tuning. Rewriting searches through different evaluation orders to find one which minimizes the roundoff error at no additional runtime cost. Mixed-precision tuning assigns different finite precisions to different variables and operations and thus provides finer-grained control than uniform precision. We show that when these two techniques are designed and applied together, they can provide higher performance improvements than each alone.","PeriodicalId":199062,"journal":{"name":"2018 ACM/IEEE 9th International Conference on Cyber-Physical Systems (ICCPS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129452233","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 53
期刊
2018 ACM/IEEE 9th International Conference on Cyber-Physical Systems (ICCPS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1