Nothing Special   »   [go: up one dir, main page]

skip to main content
survey

Recovery from Adversarial Attacks in Cyber-physical Systems: Shallow, Deep, and Exploratory Works

Published: 26 April 2024 Publication History

Abstract

Cyber-physical systems (CPS) have experienced rapid growth in recent decades. However, like any other computer-based systems, malicious attacks evolve mutually, driving CPS to undesirable physical states, and potentially causing catastrophes. Although the current state-of-the-art is well aware of this issue, the majority of researchers have not focused on CPS recovery, the procedure we defined as restoring a CPS’s physical state back to a target condition under adversarial attacks. To call for attention on CPS recovery and identify existing efforts, we have surveyed a total of 30 relevant papers. We identify a major partition of the proposed recovery strategies: shallow recovery vs. deep recovery, where the former does not use a dedicated recovery controller while the latter does. Additionally, we surveyed exploratory research on topics that facilitate recovery. From these publications, we discuss the current state-of-the-art of CPS recovery, with respect to applications, attack type, attack surfaces, and system dynamics. Then, we identify untouched sub-domains in this field and suggest possible future directions for researchers.

References

[1]
Fardin Abdi Taghi Abad, Renato Mancuso, Stanley Bak, Or Dantsker, and Marco Caccamo. 2016. Reset-based recovery for real-time cyber-physical systems with temporal safety constraints. In Proceedings of the 2016 IEEE 21st International Conference on Emerging Technologies and Factory Automation. 1–8. DOI:
[2]
Fardin Abdi, Chien-Ying Chen, Monowar Hasan, Songran Liu, Sibin Mohan, and Marco Caccamo. 2018. Guaranteed physical security with restart-based design for cyber-physical systems. In Proceedings of the 2018 ACM/IEEE 9th International Conference on Cyber-Physical Systems. 10–21. DOI:
[3]
Francis Akowuah and Fanxin Kong. 2021. Physical invariant based attack detection for autonomous vehicles: Survey, vision, and challenges. In Proceedings of the 4th International Conference on Connected and Autonomous Driving. IEEE.
[4]
Francis Akowuah and Fanxin Kong. 2021. Real-time adaptive sensor attack detection in autonomous cyber-physical systems. In Proceedings of the 27th IEEE Real-Time and Embedded Technology and Applications Symposium. IEEE.
[5]
Francis Akowuah, Romesh Prasad, Carlos Omar Espinoza, and Fanxin Kong. 2021. Recovery-by-learning: Restoring autonomous cyber-physical systems from sensor attacks. In Proceedings of the 2021 IEEE 27th International Conference on Embedded and Real-Time Computing Systems and Applications. 61–66.
[6]
Nils Albartus, Clemens Nasenberg, Florian Stolz, Marc Fyrbiak, Christof Paar, and Russell Tessier. 2021. On the design and misuse of microcoded (embedded) processors — a cautionary note. In Proceedings of the 30th USENIX Security Symposium. 267–284.
[7]
Rasim Alguliyev, Yadigar Imamverdiyev, and Lyudmila Sukhostat. 2018. Cyber-physical systems and their security issues. Computers in Industry 100 (2018), 212–223. DOI:
[8]
Cristina Bayón, Arvid Q. L. Keemink, Michelle van Mierlo, Wolfgang Rampeltshammer, Herman van der Kooij, and Edwin H. F. van Asseldonk. 2022. Cooperative ankle-exoskeleton control can reduce effort to recover balance after unexpected disturbances during walking. Journal of Neuroengineering and Rehabilitation 19, 1 (2022), 1–16.
[9]
Rakesh Rajan Beck, Abhishek Vijeev, and Vinod Ganapathy. 2020. Privaros: A framework for privacy-compliant delivery drones. In Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, New York, NY, USA, 181–194.
[10]
Steve Brooks, Andrew Gelman, Galin Jones, and Xiao-Li Meng. 2011. Handbook of Markov Chain Monte Carlo. CRC press.
[11]
Liwei Cao, Xiaoning Jiang, Yumei Zhao, Shouguang Wang, Dan You, and Xianli Xu. 2020. A survey of network attacks on cyber-physical systems. IEEE Access 8 (2020), 44219–44227. DOI:
[12]
Yulong Cao, Ningfei Wang, Chaowei Xiao, Dawei Yang, Jin Fang, Ruigang Yang, Qi Alfred Chen, Mingyan Liu, and Bo Li. 2021. Invisible for both camera and LiDAR: Security of multi-sensor fusion based perception in autonomous driving under physical-world attacks. In Proceedings of the 2021 IEEE Symposium on Security and Privacy. 176–194. DOI:
[13]
Alvaro Cardenas. 2019. Cyber-Physical Systems Security Knowledge Area Issue 1.0. Technical Report. University of California Santa Cruz.
[14]
Chien-Ying Chen, Debopam Sanyal, and Sibin Mohan. 2021. Indistinguishability prevents scheduler side channels in real-time systems. In Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security.Association for Computing Machinery, New York, NY, USA, 666–684. DOI:
[15]
Jim X. Chen. 2016. The evolution of computing: AlphaGo. Computing in Science & Engineering 18, 4 (2016), 4–7.
[16]
Hongjun Choi, Sayali Kate, Yousra Aafer, Xiangyu Zhang, and Dongyan Xu. 2020. Software-based realtime recovery from sensor attacks on robotic vehicles. In Proceedings of the 23rd International Symposium on Research in Attacks, Intrusions and Defenses. 349–364.
[17]
Hongjun Choi, Wen-Chuan Lee, Yousra Aafer, Fan Fei, Zhan Tu, Xiangyu Zhang, Dongyan Xu, and Xinyan Deng. 2018. Detecting attacks against robotic vehicles: A control invariant approach. In Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. 801–816.
[18]
Rock-Hyun Choi, Sang-Cheol Lee, Dong-Ha Lee, and Joonhyuk Yoo. 2012. WiP abstract: Packet loss compensation for cyber-physical control systems. In Proceedings of the 2012 IEEE/ACM Third International Conference on Cyber-Physical Systems. IEEE, 205–205.
[19]
Michelle S. Chong, Henrik Sandberg, and André M.H. Teixeira. 2019. A tutorial introduction to security and privacy for cyber-physical systems. In Proceedings of the 2019 18th European Control Conference. 968–978. DOI:
[20]
Rich Christie. 1993. 118 Bus Power Flow Test Case. Retrieved 15 September 2022 from http://labs.ece.uw.edu/pstca/pf118/pg_tca118bus.htm
[21]
Antonia Creswell, Tom White, Vincent Dumoulin, Kai Arulkumaran, Biswa Sengupta, and Anil A. Bharath. 2018. Generative adversarial networks: An overview. IEEE Signal Processing Magazine 35, 1 (2018), 53–65.
[22]
Alvaro A. Cárdenas and Reihaneh Safavi-Naini. 2012. Chapter 25 - security and privacy in the smart grid. In Proceedings of the Handbook on Securing Cyber-Physical Critical Infrastructure. Sajal K. Das, Krishna Kant, and Nan Zhang (Eds.), Morgan Kaufmann, Boston, 637–654. DOI:
[23]
Mahmoud Elnaggar and Nicola Bezzo. 2018. An IRL approach for cyber-physical attack intention prediction and recovery. In Proceedings of the 2018 Annual American Control Conference. 222–227. DOI:
[24]
James Farwell and Rafal Rohozinski. 2011. Stuxnet and the future of cyber war. Survival 53, 1 (2011), 23–40.
[25]
James P. Farwell and Rafal Rohozinski. 2011. Stuxnet and the future of cyber war. Survival 53, 1 (2011), 23–40.
[26]
Hamza Fawzi, Paulo Tabuada, and Suhas Diggavi. 2014. Secure estimation and control for cyber-physical systems under adversarial attacks. IEEE Transactions on Automatic Control 59, 6 (2014), 1454–1467.
[27]
Fan Fei, Zhan Tu, Dongyan Xu, and Xinyan Deng. 2020. Learn-to-recover: Retrofitting UAVs with reinforcement learning-assisted flight control under cyber-physical attacks. In Proceedings of the 2020 IEEE International Conference on Robotics and Automation. 7358–7364. DOI:
[28]
futuremarketinsights. 2022. Cyber-Physical System Market. Retrieved 10 April 2022 from https://www.futuremarketinsights.com/reports/cyber-physical-systems-market
[29]
Jairo Giraldo, David Urbina, Alvaro Cardenas, Junia Valente, Mustafa Faisal, Justin Ruths, Nils Ole Tippenhauer, Henrik Sandberg, and Richard Candell. 2018. A survey of physics-based attack detection in cyber-physical systems. Computing Surveys 51, 4 (2018), 76:1–76:36. DOI:
[30]
Harm Griffioen and Christian Doerr. 2020. Examining mirai’s battle over the internet of things. In Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, New York, NY, USA, 743–756.
[31]
Nathaniel Hamilton, Preston K. Robinette, and Taylor T. Johnson. 2022. Training agents to satisfy timed and untimed signal temporal logic specifications with reinforcement learning. In Proceedings of the International Conference on Software Engineering and Formal Methods. Springer, 190–206.
[32]
Haibo He and Jun Yan. 2016. Cyber-physical attacks and defences in the smart grid: A survey. IET Cyber-Physical Systems: Theory & Applications 1, 1 (2016), 13–27. DOI:
[33]
Tianjia He, Lin Zhang, Fanxin Kong, and Asif Salekin. 2020. Exploring inherent sensor redundancy for automotive anomaly detection. In Proceedings of the 57th Design Automation Conference. ACM.
[34]
Siu Lau Ho and Min Xie. 1998. The use of ARIMA models for reliability forecasting and analysis. Computers & Industrial Engineering 35, 1–2 (1998), 213–216.
[35]
Abdulmalik Humayed, Jingqiang Lin, Fengjun Li, and Bo Luo. 2017. Cyber-physical systems security—A survey. IEEE Internet of Things Journal 4, 6 (2017), 1802–1831.
[36]
Tom Z. Jiahao, M. Ani Hsieh, and Eric Forgoston. 2021. Knowledge-based learning of nonlinear dynamics and chaos. Chaos 31, 11 (2021), 1–10.
[37]
Pengfei Jing, Qiyi Tang, Yuefeng Du, Lei Xue, Xiapu Luo, Ting Wang, Sen Nie, and Shi Wu. 2021. Too good to be safe: Tricking lane detection in autonomous driving with crafted perturbations. In Proceedings of the 30th USENIX Security Symposium. 3237–3254.
[38]
J. Juang, M. Phan, L. G. Horta, and R. W. Longman. 1993. Identification of observer/kalman filter markov parameters: Theory and experiments. Journal of Guidance, Control and Dynamics 16, 2 (1993), 1–28.
[39]
Hakan Kayan, Matthew Nunes, Omer Rana, Pete Burnap, and Charith Perera. 2022. Cybersecurity of industrial cyber-physical systems: A review. Computing Surveys 54, 11s (2022), 229:1–229:35. DOI:
[40]
Arslan Khan, Hyungsub Kim, Byoungyoung Lee, Dongyan Xu, Antonio Bianchi, and Dave (Jing) Tian. 2021. {M2MON}: Building an {MMIO-based} security reference monitor for unmanned vehicles. In Proceedings of the 30th USENIX Security Symposium. 285–302.
[41]
Hisham A. Kholidy. 2021. Autonomous mitigation of cyber risks in the cyber–physical systems. Future Generation Computer Systems 115 (2021), 171–187.
[42]
Sangjun Kim, Yongsoon Eun, and Kyung-Joon Park. 2021. Stealthy sensor attack detection and real-time performance recovery for resilient CPS. IEEE Transactions on Industrial Informatics 17, 11 (2021), 7412–7422.
[43]
Fanxin Kong, Oleg Sokolsky, James Weimer, and Insup Lee. 2019. State consistencies for cyber-physical system recovery. In Proceedings of the Workshop on Cyber-Physical Systems Security and Resilience.
[44]
Fanxin Kong, Meng Xu, James Weimer, Oleg Sokolsky, and Insup Lee. 2018. Cyber-physical system checkpointing and recovery. In Proceedings of the 2018 ACM/IEEE 9th International Conference on Cyber-Physical Systems. IEEE, 22–31.
[45]
Fanxin Kong, Meng Xu, James Weimer, Oleg Sokolsky, and Insup Lee. 2018. Cyber-physical system checkpointing and recovery. In Proceedings of the 2018 ACM/IEEE 9th International Conference on Cyber-Physical Systems. 22–31. DOI:
[46]
Ron Koymans. 1990. Specifying real-time properties with metric temporal logic. Real-time Systems 2, 4 (1990), 255–299.
[47]
Guokun Lai, Wei-Cheng Chang, Yiming Yang, and Hanxiao Liu. 2018. Modeling long- and short-term temporal patterns with deep neural networks. The 41st International ACM SIGIR Conference on Research & Development in Information Retrieval 95–104.
[48]
Haidong Li, Jiongcheng Li, Xiaoming Guan, Binghao Liang, Yuting Lai, and Xinglong Luo. 2019. Research on overfitting of deep learning. In Proceedings of the 2019 15th International Conference on Computational Intelligence and Security. IEEE, 78–81.
[49]
Timothy P. Lillicrap, Jonathan J. Hunt, Alexander Pritzel, Nicolas Heess, Tom Erez, Yuval Tassa, David Silver, and Daan Wierstra. 2016. Continuous control with deep reinforcement learning. 4th International Conference on Learning Representations (ICLR'16).
[50]
Michael L. Littman. 2001. Value-function reinforcement learning in markov games. Cognitive Systems Research 2, 1 (2001), 55–66.
[51]
Chensheng Liu, Jing Wu, Chengnian Long, and Yebin Wang. 2016. Dynamic state recovery for cyber-physical systems under switching location attacks. IEEE Transactions on Control of Network Systems 4, 1 (2016), 14–22.
[52]
Mengyu Liu, Pengyuan Lu, Xin Chen, Fanxin Kong, Oleg Sokolsky, and Insup Lee. 2023. Fulfilling formal specifications ASAP by model-free reinforcement learning. arXiv:2304.12508. Retrieved from https://arxiv.org/abs/2304.12508
[53]
Mengyu Liu, Lin Zhang, Pengyuan Lu, Kaustubh Sridhar, Fanxin Kong, Oleg Sokolsky, and Insup Lee. 2022. Fail-safe: Securing cyber-physical systems against hidden sensor attacks. In Proceedings of the 2022 IEEE Real-Time Systems Symposium. IEEE, 240–252.
[54]
Mengyu Liu, Lin Zhang, Vir Phoha, and Fanxin Kong. 2023. Learn-to-respond: Sequence-predictive recovery from sensor attacks in cyber-physical systems. In Proceedings of the 44th IEEE Real-time Systems Symposium. IEEE.
[55]
Xinrui Liu, Min Hou, Jianjun Yang, and Yufei Sun. 2022. A consensus-based distributed two-layer control strategy with predictive compensation for islanded microgrid CPS against dos attack. International Transactions on Electrical Energy Systems 2022, 3 (2022), 1–15.
[56]
Lennart Ljung and Rajiv Singh. 2012. Version 8 of the MATLAB system identification toolbox. IFAC Proceedings Volumes 45, 16 (2012), 1826–1831.
[57]
Randolph Loh and Vrizlynn L. L. Thing. 2023. Enhancing cyber-resilience in self-healing cyber-physical systems with implicit guarantees. 2023 IEEE International Conference on Cyber Security and Resilience (CSR'23) 359–366.
[58]
Rui Ma, Sagnik Basumallik, Sara Eftekharnejad, and Fanxin Kong. 2020. Recovery-based model predictive control for cascade mitigation under cyber-physical attacks. In Proceedings of the 2020 IEEE Texas Power and Energy Conference. 1–6. DOI:
[59]
Rui Ma, Sagnik Basumallik, Sara Eftekharnejad, and Fanxin Kong. 2021. A data-driven model predictive control for alleviating thermal overloads in the presence of possible false data. IEEE Transactions on Industry Applications 57, 2 (2021), 1872–1881. DOI:
[60]
Magdi S. Mahmoud, Mutaz M. Hamdan, and Uthman A. Baroudi. 2019. Modeling and control of cyber-physical systems subject to cyber attacks: A survey of recent advances and challenges. Neurocomputing 338 (2019), 101–115. DOI:
[61]
Oded Maler and Dejan Nickovic. 2004. Monitoring temporal properties of continuous signals. In Formal Techniques, Modelling and Analysis of Timed and Fault-Tolerant Systems: Joint International Conferences on Formal Modeling and Analysis of Timed Systmes, FORMATS 2004, and Formal Techniques in Real-Time and Fault-Tolerant Systems, FTRTFT 2004, Grenoble, France, September 22–24, 2004. Proceedings. Springer, 152–166.
[62]
Mohammad Bilal Malik, Hafsa Qureshi, and Rashid A. Bhatti. 2004. Tracking of linear time varying systems by state-space recursive least-squares. In 2004 IEEE International Symposium on Circuits and Systems (IEEE Cat. No. 04CH37512). IEEE, 3 (2004), III-305.
[63]
Larry R. Medsker and L. C. Jain. 2001. Recurrent neural networks. Design and Applications 5 (2001), 64–67.
[64]
J. Sukarno Mertoguno, Ryan M. Craven, Matthew S. Mickelson, and David P. Koller. 2019. A physics-based strategy for cyber resilience of CPS. In Proceedings of the Autonomous Systems: Sensors, Processing, and Security for Vehicles and Infrastructure 2019. SPIE, 79–90.
[65]
Robert Mitchell and Ing-Ray Chen. 2014. A survey of intrusion detection techniques for cyber-physical systems. Computing Surveys 46, 4 (2014), 55:1–55:29. DOI:
[66]
Andrew Y. Ng and Stuart Russell. 2000. Algorithms for inverse reinforcement learning. In Proceedings of the ICML. 2.
[67]
Naushin Nower, Yasuo Tan, and Azman Osman Lim. 2014. Efficient temporal and spatial data recovery scheme for stochastic and incomplete feedback data of cyber-physical systems. In Proceedings of the 2014 IEEE 8th International Symposium on Service Oriented System Engineering. 192–197. DOI:
[68]
Felix O. Olowononi, Danda B. Rawat, and Chunmei Liu. 2021. Resilient machine learning for networked cyber physical systems: A survey for machine learning security to securing machine learning for CPS. IEEE Communications Surveys & Tutorials 23, 1 (2021), 524–552. DOI:
[69]
Keiron O’Shea and Ryan Nash. 2015. An introduction to convolutional neural networks. arXiv:1511.08458. Retrieved from https://arxiv.org/abs/1511.08458
[70]
Jan Peters, Sethu Vijayakumar, and Stefan Schaal. 2005. Natural actor-critic. In Proceedings of the European Conference on Machine Learning. Springer, 280–291.
[71]
Amir Pnueli. 1977. The temporal logic of programs. In Proceedings of the 18th Annual Symposium on Foundations of Computer Science. IEEE, 46–57.
[72]
Raul Quinonez, Jairo Giraldo, Luis Salazar, Erick Bauman, Alvaro Cardenas, and Zhiqiang Lin. 2020. SAVIOR: Securing autonomous vehicles with robust physical invariants. In Proceedings of the 29th USENIX Security Symposium.
[73]
Ryan Rifkin, Gene Yeo, and Tomaso Poggio. 2003. Regularized least-squares classification. Nato Science Series Sub Series III Computer and Systems Sciences 190 (2003), 131–154.
[74]
Aviva Hope Rutkin. 2013. Spoofers use fake GPS signals to knock a yacht off course. MIT Technology Review. Online; accessed May 2020.
[75]
Takami Sato, Junjie Shen, Ningfei Wang, Yunhan Jia, Xue Lin, and Qi Alfred Chen. 2021. Dirty road can attack: Security of deep learning based automated lane centering under {physical-world} attack. In Proceedings of the 30th USENIX Security Symposium. 3309–3326.
[76]
Lui Sha. 2001. Using simplicity to control complexity. IEEE Software 18, 4 (2001), 20–28. DOI:
[77]
Kun Shao, Zhentao Tang, Yuanheng Zhu, Nannan Li, and Dongbin Zhao. 2019. A survey of deep reinforcement learning in video games. arXiv:1912.10944. Retrieved from https://arxiv.org/abs/1912.10944
[78]
Wanxing Sheng, Keyan Liu, Zhao Li, and Xueshun Ye. 2023. Collaborative fault recovery and network reconstruction method for cyber-physical-systems based on double layer optimization. CSEE Journal of Power and Energy Systems 9, 1 (2023), 380–392.
[79]
Jongho Shin, Youngmi Baek, Jaeseong Lee, and Seonghun Lee. 2019. Cyber-physical attack detection and recovery based on RNN in automotive brake systems. Applied Sciences 9, 1 (2019), 82–103.
[80]
David Silver, Thomas Hubert, Julian Schrittwieser, Ioannis Antonoglou, Matthew Lai, Arthur Guez, Marc Lanctot, Laurent Sifre, Dharshan Kumaran, Thore Graepel, Timothy Lillicrap, Karen Simonyan, and Demis Hassabis. 2018. A general reinforcement learning algorithm that masters chess, shogi, and Go through self-play. Science 362, 6419 (2018), 1140–1144.
[81]
Yunmok Son, Hocheol Shin, Dongkwan Kim, and Youngseok Park. 2015. Rocking drones with intentional sound noise on gyroscopic sensors. In Proceedings of the 24th USENIX Security Symposium.
[82]
Jiachen Sun, Yulong Cao, Qi Alfred Chen and Z. Morley Mao. 2020. Towards robust LiDAR-based perception in autonomous driving: General black-box adversarial sensor attack and countermeasures. 29th USENIX Security Symposium (USENIX Security'20) 877–894.
[83]
Sebastian Surminski, Christian Niesler, Ferdinand Brasser, Lucas Davi, and Ahmad-Reza Sadeghi. 2021. RealSWATT: Remote software-based attestation for embedded devices under realtime constraints. In Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, New York, NY, USA, 2890–2905. DOI:
[84]
Csaba Szepesvári and Michael L. Littman. 1999. A unified analysis of value-function-based reinforcement-learning algorithms. Neural Computation 11, 8 (1999), 2017–2060.
[85]
Yazhou Tu, Zhiqiang Lin, Insup Lee, and Xiali Hei. 2018. Injected and delivered: Fabricating implicit control over actuation systems by spoofing inertial sensors. In Proceedings of the 27th USENIX Security Symposium. 1545–1562.
[86]
Valasek, John, and Wei Chen. 2003. Observer/Kalman filter identification for online system identification of aircraft. Journal of Guidance, Control, and Dynamics 26, 2 (2003), 347–353.
[87]
Hado Van Hasselt, Arthur Guez, and David Silver. 2016. Deep reinforcement learning with double q-learning. In Proceedings of the AAAI Conference on Artificial Intelligence.
[88]
Korosh Vatanparvar and Mohammad Abdullah Al Faruque. 2019. Self-secured control with anomaly detection and recovery in automotive cyber-physical systems. In 2019 Design, Automation Test in Europe Conference Exhibition (DATE). 788–793.
[89]
Ruixuan Wang, Fanxin Kong, Hasshi Sudler, and Xun Jiao. 2021. HDAD: Hyperdimensional computing-based anomaly detection for automotive sensor attacks. In Proceedings of the 27th IEEE Real-Time and Embedded Technology and Applications Symposium, Brief Industry Paper Track. IEEE.
[90]
Shengjie Wang, Kun Wang, Chunsong Zhang, and Jian S Dai. 2022. Kinetostatic backflip strategy for self-recovery of quadruped robots with the selected rotation axis. Robotica 40, 6 (2022), 1713–1731.
[91]
Wei Wang, Yao Yao, Xin Liu, Xiang Li, Pei Hao, and Ting Zhu. 2021. I can see the light: Attacks on autonomous vehicles using invisible lights. In Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security.Association for Computing Machinery, New York, NY, USA, 1930–1944. DOI:
[92]
Yihe Wang, Bo Hu, Xiao Pan, Tingting Xu, and Qiuye Sun. 2022. Security control of denial-of-service attacks in cyber-physical systems based on dynamic feedback. Computational Intelligence and Neuroscience 2022, 1 (2022), 1–10.
[93]
Zhe Wang and Tianzhen Hong. 2020. Reinforcement learning for building controls: The opportunities and challenges. Applied Energy 269 (2020), 115036.
[94]
Zifan Wang, Lin Zhang, Qinru Qiu, and Fanxin Kong. 2023. Catch you if pay attention: Temporal sensor attack diagnosis using attention mechanisms for cyber-physical systems. In Proceedings of the 44th IEEE Real-time Systems Symposium. IEEE.
[95]
Christopher J. C. H Watkins and Peter Dayan. 1992. Q-learning. Machine Learning 8, 3 (1992), 279–292.
[96]
Shimeng Wu, Yuchen Jiang, Hao Luo, Jiusi Zhang, Shen Yin, and Okyay Kaynak. 2022. An integrated data-driven scheme for the defense of typical cyber–physical attacks. Reliability Engineering & System Safety 220 (2022), 108257.
[97]
Feng Xia, Xiangjie Kong, and Zhenzhen Xu. 2011. Cyber-physical control over wireless sensor and actuator networks with packet loss. In Proceedings of the Wireless Networking Based Control. Springer, 85–102.
[98]
Jean-Paul A. Yaacoub, Ola Salman, Hassan N. Noura, Nesrine Kaaniche, Ali Chehab, and Mohamad Malli. 2020. Cyber-physical systems security: Limitations, issues and future trends. Microprocessors and Microsystems 77 (2020), 103201. DOI:
[99]
Chen Yan, Hocheol Shin, Connor Bolton, Wenyuan Xu, Yongdae Kim, and Kevin Fu. 2020. SoK: A minimalist approach to formalizing analog sensor security. In Proceedings of the 2020 IEEE Symposium on Security and Privacy. 480–495.
[100]
Sze Zheng Yong, Minghui Zhu, and Emilio Frazzoli. 2015. Resilient state estimation against switching attacks on stochastic cyber-physical systems. In Proceedings of the 2015 54th IEEE Conference on Decision and Control. IEEE, 5162–5169.
[101]
Abel Zambrano, Alejandro Palacio Betancur, Luis Burbano, Andres Felipe Niño, Luis Felipe Giraldo, Mariantonieta Gutierrez Soto, Jairo Giraldo, and Alvaro A. Cardenas. 2021. You make me tremble: A first look at attacks against structural control systems. In Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, New York, NY, USA, 1320–1337. DOI:
[102]
Chiyuan Zhang, Oriol Vinyals, Remi Munos, and Samy Bengio. 2018. A study on overfitting in deep reinforcement learning. arXiv:1804.06893. Retrieved from https://arxiv.org/abs/1804.06893
[103]
Lin Zhang, Xin Chen, Fanxin Kong, and Alvaro A. Cardenas. 2020. Real-time recovery for cyber-physical systems using linear approximations. In Proceedings of the 41st IEEE Real-Time Systems Symposium. IEEE.
[104]
Lin Zhang, Pengyuan Lu, Fanxin Kong, Xin Chen, Oleg Sokolsky, and Insup Lee. 2021. Real-time attack-recovery for cyber-physical systems using linear-quadratic regulator. ACM Transactions on Embedded Computing Systems 20, 5s (2021), 1–24.
[105]
Lin Zhang, Kaustubh Sridhar, Mengyu Liu, Pengyuan Lu, Xin Chen, Fanxin Kong, Oleg Sokolsky, and Insup Lee. 2023. Real-time data-predictive attack-recovery for complex cyber-physical systems. In Proceedings of the 2023 IEEE 29th Real-Time and Embedded Technology and Applications Symposium. IEEE, 209–222.
[106]
Lin Zhang, Zifan Wang, Mengyu Liu, and Fanxin Kong. 2022. Adaptive window-based sensor attack detection for cyber-physical systems. In Proceedings of the 59th Design Automation Conference. ACM.
[107]
Youqian Zhang and K. B. Rasmussen. 2020. Detection of electromagnetic interference attacks on sensor systems. In Proceedings of the IEEE Symposium on Security and Privacy.
[108]
Yangming Zhao, Mohammed Pithapur, and Chunming Qiao. 2016. On progressive recovery in interdependent cyber physical systems. In Proceedings of the 2016 IEEE Global Communications Conference. 1–6. DOI:
[109]
Ce Zhou, Qiben Yan, Yan Shi, and Lichao Sun. 2022. {DoubleStar}: {long-range} attack towards depth estimation based obstacle avoidance in autonomous systems. In Proceedings of the 31st USENIX Security Symposium.
[110]
Yi Zhu, Chenglin Miao, Tianhang Zheng, Foad Hajiaghajani, Lu Su, and Chunming Qiao. 2021. Can we use arbitrary objects to attack LiDAR perception in autonomous driving? In Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, New York, NY, USA, 1945–1960. DOI:

Cited By

View all
  • (2024)Balancing Privacy and Robustness in Prompt Learning for Large Language ModelsMathematics10.3390/math1221335912:21(3359)Online publication date: 26-Oct-2024
  • (2024)CPSim: Simulation Toolbox for Security Problems in Cyber-Physical SystemsACM Transactions on Design Automation of Electronic Systems10.1145/367490429:5(1-16)Online publication date: 25-Jun-2024
  • (2024) Optimal Tampering Attack Strategy for FIR System Identification With Multi‐Level Quantized Observations International Journal of Robust and Nonlinear Control10.1002/rnc.7729Online publication date: 12-Dec-2024

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Computing Surveys
ACM Computing Surveys  Volume 56, Issue 8
August 2024
963 pages
EISSN:1557-7341
DOI:10.1145/3613627
Issue’s Table of Contents

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 26 April 2024
Online AM: 27 March 2024
Accepted: 07 March 2024
Revised: 23 December 2023
Received: 26 August 2022
Published in CSUR Volume 56, Issue 8

Check for updates

Author Tags

  1. Cyber-physical systems recovery
  2. life-critical cyber-physical systems

Qualifiers

  • Survey

Funding Sources

  • NSF
  • NSF

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)558
  • Downloads (Last 6 weeks)49
Reflects downloads up to 21 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Balancing Privacy and Robustness in Prompt Learning for Large Language ModelsMathematics10.3390/math1221335912:21(3359)Online publication date: 26-Oct-2024
  • (2024)CPSim: Simulation Toolbox for Security Problems in Cyber-Physical SystemsACM Transactions on Design Automation of Electronic Systems10.1145/367490429:5(1-16)Online publication date: 25-Jun-2024
  • (2024) Optimal Tampering Attack Strategy for FIR System Identification With Multi‐Level Quantized Observations International Journal of Robust and Nonlinear Control10.1002/rnc.7729Online publication date: 12-Dec-2024

View Options

Login options

Full Access

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Full Text

View this article in Full Text.

Full Text

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media