Provable Adversarial Safety in Cyber-Physical Systems

被引:0
作者
Castellanos, John H. [1 ]
Maghenem, Mohamed [2 ]
Cardenas, Alvaro A. [3 ]
Sanfelice, Ricardo G. [3 ]
Zhou, Jianying [4 ]
机构
[1] CISPA Helmholtz Ctr Informat Secur, Saarbrucken, Germany
[2] Univ Grenoble Alpes, CNRS, Grenoble INP, Grenoble, France
[3] Univ Calif Santa Cruz, Santa Cruz, CA USA
[4] Singapore Univ Technol & Design, Singapore, Singapore
来源
2023 IEEE 8TH EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY, EUROS&P | 2023年
关键词
BARRIER FUNCTIONS; HYBRID; SECURITY;
D O I
10.1109/EuroSP57164.2023.00062
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Most proposals for securing control systems are heuristic in nature, and while they increase the protection of their target, the security guarantees they provide are unclear. This paper proposes a new way of modeling the security guarantees of a Cyber-Physical System (CPS) against arbitrary false command attacks. As our main case study, we use the most popular testbed for control systems security. We first propose a detailed formal model of this testbed and then show how the original configuration is vulnerable to a single-actuator attack. We then propose modifications to the control system and prove that our modified system is secure against arbitrary, single-actuator attacks.
引用
收藏
页码:979 / 1012
页数:34
相关论文
共 70 条
  • [1] Distributed Detection of Single-Stage Multipoint Cyber Attacks in a Water Treatment Plant
    Adepu, Sridhar
    Mathur, Aditya
    [J]. ASIA CCS'16: PROCEEDINGS OF THE 11TH ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, : 449 - 460
  • [2] NoisePrint: Attack Detection Using Sensor and Process Noise Fingerprint in Cyber Physical Systems
    Ahmed, Chuadhry Mujeeb
    Ochoa, Martin
    Zhou, Jianying
    Mathur, Aditya P.
    Qadeer, Rizwan
    Murguia, Carlos
    Ruths, Justin
    [J]. PROCEEDINGS OF THE 2018 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (ASIACCS'18), 2018, : 483 - 497
  • [3] Noise Matters: Using Sensor and Process Noise Fingerprint to Detect Stealthy Cyber Attacks and Authenticate sensors in CPS
    Ahmed, Chuadhry Mujeeb
    Zhou, Jianying
    Mathur, Aditya P.
    [J]. 34TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2018), 2018, : 566 - 581
  • [4] Alur R, 2003, LECT NOTES COMPUT SC, V2619, P208
  • [5] Ames AD, 2019, 2019 18TH EUROPEAN CONTROL CONFERENCE (ECC), P3420, DOI [10.23919/ECC.2019.8796030, 10.23919/ecc.2019.8796030]
  • [6] [Anonymous], 2017, AP REV HACK 34 MONTH
  • [7] Aubin JP., 1991, VIABILITY THEORY
  • [8] Adversarial Sensor Attack on LiDAR-based Perception in Autonomous Driving
    Cao, Yulong
    Xiao, Chaowei
    Cyr, Benjamin
    Zhou, Yimeng
    Park, Won
    Rampazzi, Sara
    Chen, Qi Alfred
    Fu, Kevin
    Mao, Z. Morley
    [J]. PROCEEDINGS OF THE 2019 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'19), 2019, : 2267 - 2281
  • [9] Finding Dependencies between Cyber-Physical Domains for Security Testing of Industrial Control Systems
    Castellanos, John H.
    Ochoa, Martin
    Zhou, Jianying
    [J]. 34TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2018), 2018, : 582 - 594
  • [10] A Modular Hybrid Learning Approach for Black-Box Security Testing of CPS
    Castellanos, John Henry
    Zhou, Jianying
    [J]. APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, ACNS 2019, 2019, 11464 : 196 - 216