首页 > 最新文献

2016 Science of Security for Cyber-Physical Systems Workshop (SOSCYPS)最新文献

英文 中文
Advances and challenges of quantitative verification and synthesis for cyber-physical systems 信息物理系统定量验证与综合的进展与挑战
Pub Date : 2016-04-11 DOI: 10.1109/SOSCYPS.2016.7579999
Marta Z. Kwiatkowska
We are witnessing a huge growth of cyber-physical systems, which are autonomous, mobile, endowed with sensing, controlled by software, and often wirelessly connected and Internet-enabled. They include factory automation systems, robotic assistants, self-driving cars, and wearable and implantable devices. Since they are increasingly often used in safety- or business-critical contexts, to mention invasive treatment or biometric authentication, there is an urgent need for modelling and verification technologies to support the design process, and hence improve the reliability and reduce production costs. This paper gives an overview of quantitative verification and synthesis techniques developed for cyber-physical systems, summarising recent achievements and future challenges in this important field.
我们正在目睹网络物理系统的巨大增长,这些系统是自主的、移动的、具有传感功能的、由软件控制的,通常是无线连接和支持互联网的。它们包括工厂自动化系统、机器人助手、自动驾驶汽车以及可穿戴和植入式设备。由于它们越来越多地用于安全或业务关键环境,例如侵入性治疗或生物识别认证,因此迫切需要建模和验证技术来支持设计过程,从而提高可靠性并降低生产成本。本文概述了为信息物理系统开发的定量验证和综合技术,总结了这一重要领域的最新成就和未来挑战。
{"title":"Advances and challenges of quantitative verification and synthesis for cyber-physical systems","authors":"Marta Z. Kwiatkowska","doi":"10.1109/SOSCYPS.2016.7579999","DOIUrl":"https://doi.org/10.1109/SOSCYPS.2016.7579999","url":null,"abstract":"We are witnessing a huge growth of cyber-physical systems, which are autonomous, mobile, endowed with sensing, controlled by software, and often wirelessly connected and Internet-enabled. They include factory automation systems, robotic assistants, self-driving cars, and wearable and implantable devices. Since they are increasingly often used in safety- or business-critical contexts, to mention invasive treatment or biometric authentication, there is an urgent need for modelling and verification technologies to support the design process, and hence improve the reliability and reduce production costs. This paper gives an overview of quantitative verification and synthesis techniques developed for cyber-physical systems, summarising recent achievements and future challenges in this important field.","PeriodicalId":422727,"journal":{"name":"2016 Science of Security for Cyber-Physical Systems Workshop (SOSCYPS)","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131996681","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Towards foundational verification of cyber-physical systems 迈向网络物理系统的基础验证
Pub Date : 2016-04-11 DOI: 10.1109/SOSCYPS.2016.7580000
G. Malecha, Daniel Ricketts, Mario M. Alvarez, Sorin Lerner
The safety-critical aspects of cyber-physical systems motivate the need for rigorous analysis of these systems. In the literature this work is often done using idealized models of systems where the analysis can be carried out using high-level reasoning techniques such as Lyapunov functions and model checking. In this paper we present VERIDRONE, a foundational framework for reasoning about cyber-physical systems at all levels from high-level models to C code that implements the system. VERIDRONE is a library within the Coq proof assistant enabling us to build on its foundational implementation, its interactive development environments, and its wealth of libraries capturing interesting theories ranging from real numbers and differential equations to verified compilers and floating point numbers. These features make proof assistants in general, and Coq in particular, a powerful platform for unifying foundational results about safety-critical systems and ensuring interesting properties at all levels of the stack.
网络物理系统的安全关键方面激发了对这些系统进行严格分析的需要。在文献中,这项工作通常使用系统的理想化模型来完成,其中分析可以使用高级推理技术(如Lyapunov函数和模型检查)进行。在本文中,我们提出了VERIDRONE,这是一个基本框架,用于从高级模型到实现系统的C代码的所有级别的网络物理系统的推理。VERIDRONE是Coq证明助手中的一个库,使我们能够在其基础实现、交互式开发环境和丰富的库的基础上进行构建,这些库捕获了从实数和微分方程到经过验证的编译器和浮点数等有趣的理论。这些特性使证明助手(尤其是Coq)成为一个强大的平台,用于统一关于安全关键系统的基本结果,并确保堆栈所有级别的有趣属性。
{"title":"Towards foundational verification of cyber-physical systems","authors":"G. Malecha, Daniel Ricketts, Mario M. Alvarez, Sorin Lerner","doi":"10.1109/SOSCYPS.2016.7580000","DOIUrl":"https://doi.org/10.1109/SOSCYPS.2016.7580000","url":null,"abstract":"The safety-critical aspects of cyber-physical systems motivate the need for rigorous analysis of these systems. In the literature this work is often done using idealized models of systems where the analysis can be carried out using high-level reasoning techniques such as Lyapunov functions and model checking. In this paper we present VERIDRONE, a foundational framework for reasoning about cyber-physical systems at all levels from high-level models to C code that implements the system. VERIDRONE is a library within the Coq proof assistant enabling us to build on its foundational implementation, its interactive development environments, and its wealth of libraries capturing interesting theories ranging from real numbers and differential equations to verified compilers and floating point numbers. These features make proof assistants in general, and Coq in particular, a powerful platform for unifying foundational results about safety-critical systems and ensuring interesting properties at all levels of the stack.","PeriodicalId":422727,"journal":{"name":"2016 Science of Security for Cyber-Physical Systems Workshop (SOSCYPS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122824828","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
From control system security indices to attack identifiability 从控制系统安全指标到攻击可识别性
Pub Date : 2016-04-11 DOI: 10.1109/SOSCYPS.2016.7580001
H. Sandberg, André M. H. Teixeira
In this paper, we investigate detectability and identifiability of attacks on linear dynamical systems that are subjected to external disturbances. We generalize a concept for a security index, which was previously introduced for static systems. The index exactly quantifies the resources necessary for targeted attacks to be undetectable and unidentifiable in the presence of disturbances. This information is useful for both risk assessment and for the design of anomaly detectors. Finally, we show how techniques from the fault detection literature can be used to decouple disturbances and to identify attacks, under certain sparsity constraints.
在本文中,我们研究了受外部干扰的线性动力系统攻击的可检测性和可识别性。我们推广了安全索引的概念,这个概念以前是为静态系统引入的。该索引精确地量化了在存在干扰的情况下无法检测和识别目标攻击所需的资源。这些信息对于风险评估和异常检测器的设计都很有用。最后,我们展示了在一定的稀疏性约束下,如何使用故障检测文献中的技术来解耦干扰和识别攻击。
{"title":"From control system security indices to attack identifiability","authors":"H. Sandberg, André M. H. Teixeira","doi":"10.1109/SOSCYPS.2016.7580001","DOIUrl":"https://doi.org/10.1109/SOSCYPS.2016.7580001","url":null,"abstract":"In this paper, we investigate detectability and identifiability of attacks on linear dynamical systems that are subjected to external disturbances. We generalize a concept for a security index, which was previously introduced for static systems. The index exactly quantifies the resources necessary for targeted attacks to be undetectable and unidentifiable in the presence of disturbances. This information is useful for both risk assessment and for the design of anomaly detectors. Finally, we show how techniques from the fault detection literature can be used to decouple disturbances and to identify attacks, under certain sparsity constraints.","PeriodicalId":422727,"journal":{"name":"2016 Science of Security for Cyber-Physical Systems Workshop (SOSCYPS)","volume":"37 15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125704030","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
Security games on infrastructure networks 基础设施网络上的安全游戏
Pub Date : 2016-04-11 DOI: 10.1109/SOSCYPS.2016.7579997
Saurabh Amin
The theory of robust control models the controller-disturbance interaction as a game where disturbance is nonstrategic. The proviso of a deliberately malicious (strategic) attacker should be considered to increase the robustness of infrastructure systems. This has become especially important since many IT systems supporting critical functionalities are vulnerable to exploits by attackers. While the usefulness of game theory methods for modeling cyber-security is well established in the literature, new game theoretic models of cyber-physical security are needed for deriving useful insights on "optimal" attack plans and defender responses, both in terms of allocation of resources and operational strategies of these players. This whitepaper presents some progress and challenges in using game-theoretic models for security of infrastructure networks. Main insights from the following models are presented: (i) Network security game on flow networks under strategic edge disruptions; (ii) Interdiction problem on distribution networks under node disruptions; (iii) Inspection game to monitor commercial non-technical losses (e.g. energy diversion); and (iv) Interdependent security game of networked control systems under communication failures. These models can be used to analyze the attacker-defender interactions in a class of cyber-physical security scenarios.
鲁棒控制理论将控制器与干扰的相互作用建模为一个非策略干扰的博弈。应该考虑故意恶意(战略)攻击者的附带条件,以增加基础设施系统的健壮性。这一点变得尤为重要,因为许多支持关键功能的IT系统容易受到攻击者的攻击。虽然博弈论方法对网络安全建模的有用性已经在文献中得到了很好的建立,但是需要新的网络物理安全博弈论模型来获得关于“最佳”攻击计划和防御者反应的有用见解,无论是在资源分配方面还是在这些参与者的操作策略方面。本文介绍了利用博弈论模型研究基础设施网络安全的一些进展和挑战。本文给出了以下模型的主要见解:(i)战略边缘中断下流量网络的网络安全博弈;节点中断情况下配电网的阻断问题;监测商业非技术损失(例如能源转移)的检查游戏;(四)网络控制系统在通信故障下的相互依赖安全博弈。这些模型可用于分析一类网络物理安全场景中的攻击防御交互。
{"title":"Security games on infrastructure networks","authors":"Saurabh Amin","doi":"10.1109/SOSCYPS.2016.7579997","DOIUrl":"https://doi.org/10.1109/SOSCYPS.2016.7579997","url":null,"abstract":"The theory of robust control models the controller-disturbance interaction as a game where disturbance is nonstrategic. The proviso of a deliberately malicious (strategic) attacker should be considered to increase the robustness of infrastructure systems. This has become especially important since many IT systems supporting critical functionalities are vulnerable to exploits by attackers. While the usefulness of game theory methods for modeling cyber-security is well established in the literature, new game theoretic models of cyber-physical security are needed for deriving useful insights on \"optimal\" attack plans and defender responses, both in terms of allocation of resources and operational strategies of these players. This whitepaper presents some progress and challenges in using game-theoretic models for security of infrastructure networks. Main insights from the following models are presented: (i) Network security game on flow networks under strategic edge disruptions; (ii) Interdiction problem on distribution networks under node disruptions; (iii) Inspection game to monitor commercial non-technical losses (e.g. energy diversion); and (iv) Interdependent security game of networked control systems under communication failures. These models can be used to analyze the attacker-defender interactions in a class of cyber-physical security scenarios.","PeriodicalId":422727,"journal":{"name":"2016 Science of Security for Cyber-Physical Systems Workshop (SOSCYPS)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127057021","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Accountability in cyber-physical systems 网络物理系统中的责任
Pub Date : 2016-04-11 DOI: 10.1109/SOSCYPS.2016.7579998
Anupam Datta, S. Kar, B. Sinopoli, Sean Weerakkody
Our position is that a key component of securing cyber-physical systems (CPS) is to develop a theory of accountability that encompasses both control and computing systems. We envision that a unified theory of accountability in CPS can be built on a foundation of causal information flow analysis. This theory will support design and analysis of mechanisms at various stages of the accountability regime: attack detection, responsibility-assignment (e.g., attack identification or localization), and corrective measures (e.g., via resilient control) As an initial step in this direction, we summarize our results on attack detection in control systems. We use the Kullback-Liebler (KL) divergence as a causal information flow measure. We then recover, using information flow analyses, a set of existing results in the literature that were previously proved using different techniques. These results cover passive detection, stealthy attack characterization, and active detection. This research direction is related to recent work on accountability in computational systems [1], [2], [3], [4]. We envision that by casting accountability theories in computing and control systems in terms of causal information flow, we can provide a common foundation to develop a theory for CPS that compose elements from both domains.
我们的立场是,保护网络物理系统(CPS)的一个关键组成部分是发展一种涵盖控制和计算系统的责任理论。我们设想,在因果信息流分析的基础上,可以建立一个统一的CPS问责理论。该理论将支持在问责制制度的各个阶段的机制设计和分析:攻击检测,责任分配(例如,攻击识别或定位)和纠正措施(例如,通过弹性控制)作为这个方向的第一步,我们总结了我们在控制系统中攻击检测的结果。我们使用Kullback-Liebler (KL)散度作为因果信息流度量。然后,我们使用信息流分析,恢复先前使用不同技术证明的文献中的一组现有结果。这些结果包括被动检测、隐形攻击表征和主动检测。该研究方向与最近关于计算系统问责制的工作有关[1],[2],[3],[4]。我们设想,通过在计算和控制系统中使用因果信息流的问责理论,我们可以为开发包含两个领域元素的CPS理论提供一个共同的基础。
{"title":"Accountability in cyber-physical systems","authors":"Anupam Datta, S. Kar, B. Sinopoli, Sean Weerakkody","doi":"10.1109/SOSCYPS.2016.7579998","DOIUrl":"https://doi.org/10.1109/SOSCYPS.2016.7579998","url":null,"abstract":"Our position is that a key component of securing cyber-physical systems (CPS) is to develop a theory of accountability that encompasses both control and computing systems. We envision that a unified theory of accountability in CPS can be built on a foundation of causal information flow analysis. This theory will support design and analysis of mechanisms at various stages of the accountability regime: attack detection, responsibility-assignment (e.g., attack identification or localization), and corrective measures (e.g., via resilient control) As an initial step in this direction, we summarize our results on attack detection in control systems. We use the Kullback-Liebler (KL) divergence as a causal information flow measure. We then recover, using information flow analyses, a set of existing results in the literature that were previously proved using different techniques. These results cover passive detection, stealthy attack characterization, and active detection. This research direction is related to recent work on accountability in computational systems [1], [2], [3], [4]. We envision that by casting accountability theories in computing and control systems in terms of causal information flow, we can provide a common foundation to develop a theory for CPS that compose elements from both domains.","PeriodicalId":422727,"journal":{"name":"2016 Science of Security for Cyber-Physical Systems Workshop (SOSCYPS)","volume":"136 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123416860","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
A set-theoretic approach for secure and resilient control of Cyber-Physical Systems subject to false data injection attacks 针对虚假数据注入攻击的网络物理系统安全弹性控制的集合理论方法
Pub Date : 2016-04-11 DOI: 10.1109/SOSCYPS.2016.7580002
Walter Lucia, B. Sinopoli, G. Franzé
In this paper a novel set-theoretic control framework for Cyber-Physical Systems is presented. By resorting to set-theoretic ideas, an anomaly detector module and a control remediation strategy are formally derived with the aim to contrast cyber False Data Injection (FDI) attacks affecting the communication channels. The resulting scheme ensures Uniformly Ultimate Boundedness and constraints fulfillment regardless of any admissible attack scenario.
本文提出了一种新的信息物理系统的集论控制框架。利用集合论思想,正式推导了异常检测模块和控制补救策略,目的是对比影响通信通道的网络虚假数据注入(FDI)攻击。结果方案确保了统一的最终有界性和约束的实现,而不管任何允许的攻击场景。
{"title":"A set-theoretic approach for secure and resilient control of Cyber-Physical Systems subject to false data injection attacks","authors":"Walter Lucia, B. Sinopoli, G. Franzé","doi":"10.1109/SOSCYPS.2016.7580002","DOIUrl":"https://doi.org/10.1109/SOSCYPS.2016.7580002","url":null,"abstract":"In this paper a novel set-theoretic control framework for Cyber-Physical Systems is presented. By resorting to set-theoretic ideas, an anomaly detector module and a control remediation strategy are formally derived with the aim to contrast cyber False Data Injection (FDI) attacks affecting the communication channels. The resulting scheme ensures Uniformly Ultimate Boundedness and constraints fulfillment regardless of any admissible attack scenario.","PeriodicalId":422727,"journal":{"name":"2016 Science of Security for Cyber-Physical Systems Workshop (SOSCYPS)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130714485","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 30
期刊
2016 Science of Security for Cyber-Physical Systems Workshop (SOSCYPS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1