Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/3139337.3139347acmconferencesArticle/Chapter ViewAbstractPublication PagespldiConference Proceedingsconference-collections
research-article

Design-time Quantification of Integrity in Cyber-physical Systems

Published: 30 October 2017 Publication History

Abstract

In a software system it is possible to quantify the amount of information that is leaked or corrupted by analysing the flows of information present in the source code. In a cyber-physical system, information flows are not only present at the digital level but also at a physical level, and they are also present to and fro the two levels. In this work, we provide a methodology to formally analyse a composite, cyber-physical system model (combining physics and control) using an information flow-theoretic approach. We use this approach to quantify the level of vulnerability of a system with respect to attackers with different capabilities. We illustrate our approach by means of a water distribution case study.

References

[1]
B.M. Adams, W.H. Woodall, and C.A. Lowry 1992. The use (and misuse) of false alarm probabilities in control chart design. Frontiers in Statistical Quality Control 4 (1992), 155--168.
[2]
Sridhar Adepu and Aditya Mathur 2016. Using Process Invariants to Detect Cyber Attacks on a Water Treatment System. Springer International Publishing, Cham, 91--104. https://doi.org/10.1007/978--3--319--33630--5_7
[3]
Rajeev Alur. 2015. Principles of cyber-physical systems. MIT Press.
[4]
R. Alur, C. Courcoubetis, N. Halbwachs, T.A. Henzinger, P.-H. Ho, X. Nicollin, A. Olivero, J. Sifakis, and S. Yovine 1995. The algorithmic analysis of hybrid systems. Theoretical Computer Science Vol. 138, 1 (1995), 3 -- 34. 1145/2976749.2978388
[5]
C.S. van Dobben de Bruyn. 1968. Cumulative sum tests : theory and practice. London : Griffin.
[6]
A. Wald 1945. Sequential Tests of Statistical Hypotheses. Ann. Math. Statist. Vol. 16 (1945), 117--186.
[7]
S. Weerakkody and B. Sinopoli 2015. Detecting integrity attacks on control systems using a moving target approach 2015 54th IEEE Conference on Decision and Control (CDC). 5820--5826.
[8]
S. Weerakkody, B. Sinopoli, S. Kar, and A. Datta. 2016. Information flow for security in control systems. 2016 IEEE 55th Conference on Decision and Control (CDC). 5065--5072. https://doi.org/10.1109/CDC.2016.7799044
[9]
A. Willsky. 1976. A survey of design methods for failure detection in dynamic systems. Automatica Vol. 12 (1976), 601 -- 611. endthebibliography

Cited By

View all
  • (2021)AttkFinder: Discovering Attack Vectors in PLC Programs using Information Flow AnalysisProceedings of the 24th International Symposium on Research in Attacks, Intrusions and Defenses10.1145/3471621.3471864(235-250)Online publication date: 6-Oct-2021
  • (2021)A Semantic Framework for Direct Information Flows in Hybrid-Dynamic SystemsProceedings of the 7th ACM on Cyber-Physical System Security Workshop10.1145/3457339.3457981(5-15)Online publication date: 24-May-2021
  • (2020)Privacy Against State estimation: An Optimization Framework based on the Data Processing InequalityIFAC-PapersOnLine10.1016/j.ifacol.2020.12.126053:2(7368-7373)Online publication date: 2020
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
PLAS '17: Proceedings of the 2017 Workshop on Programming Languages and Analysis for Security
October 2017
128 pages
ISBN:9781450350990
DOI:10.1145/3139337
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 30 October 2017

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. control theory
  2. cyber-physical systems
  3. information flow
  4. non-interference

Qualifiers

  • Research-article

Conference

CCS '17
Sponsor:

Acceptance Rates

PLAS '17 Paper Acceptance Rate 8 of 10 submissions, 80%;
Overall Acceptance Rate 43 of 77 submissions, 56%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)9
  • Downloads (Last 6 weeks)0
Reflects downloads up to 01 Oct 2024

Other Metrics

Citations

Cited By

View all
  • (2021)AttkFinder: Discovering Attack Vectors in PLC Programs using Information Flow AnalysisProceedings of the 24th International Symposium on Research in Attacks, Intrusions and Defenses10.1145/3471621.3471864(235-250)Online publication date: 6-Oct-2021
  • (2021)A Semantic Framework for Direct Information Flows in Hybrid-Dynamic SystemsProceedings of the 7th ACM on Cyber-Physical System Security Workshop10.1145/3457339.3457981(5-15)Online publication date: 24-May-2021
  • (2020)Privacy Against State estimation: An Optimization Framework based on the Data Processing InequalityIFAC-PapersOnLine10.1016/j.ifacol.2020.12.126053:2(7368-7373)Online publication date: 2020
  • (2020)Systematic Classification of Attackers via Bounded Model CheckingVerification, Model Checking, and Abstract Interpretation10.1007/978-3-030-39322-9_11(226-247)Online publication date: 16-Jan-2020
  • (2018)On Reachable Sets of Hidden CPS Sensor Attacks2018 Annual American Control Conference (ACC)10.23919/ACC.2018.8431582(178-184)Online publication date: Jun-2018
  • (2018)Constraining Attacker Capabilities Through Actuator Saturation2018 Annual American Control Conference (ACC)10.23919/ACC.2018.8430881(986-991)Online publication date: Jun-2018
  • (2018)Finding Dependencies between Cyber-Physical Domains for Security Testing of Industrial Control SystemsProceedings of the 34th Annual Computer Security Applications Conference10.1145/3274694.3274745(582-594)Online publication date: 3-Dec-2018
  • (2018)Secure Autonomous Cyber-Physical Systems Through Verifiable Information Flow ControlProceedings of the 2018 Workshop on Cyber-Physical Systems Security and PrivaCy10.1145/3264888.3264889(48-59)Online publication date: 15-Oct-2018

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media