2020
DOI: 10.1145/3373270
|View full text |Cite
|
Sign up to set email alerts
|

A Formal Approach to Physics-based Attacks in Cyber-physical Systems

Abstract: We apply formal methods to lay and streamline theoretical foundations to reason about Cyber-Physical Systems (CPSs) and physics-based attacks, i.e., attacks targeting physical devices. We focus on a formal treatment of both integrity and denial of service attacks to sensors and actuators of CPSs, and on the timing aspects of these attacks. Our contributions are fourfold. (1) We define a hybrid process calculus to model both CPSs and physics-based attacks. (2) We formalise a threat model that specifies MITM att… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
7
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
5
4

Relationship

3
6

Authors

Journals

citations
Cited by 38 publications
(7 citation statements)
references
References 62 publications
0
7
0
Order By: Relevance
“…Formal analysis of sensor attacks Lanotte et al [16], [17] propose formal approaches to model and analyze sensor attacks with a process calculus. The threat model allows attacks that manipulate sensor readings or control commands to compromise state.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Formal analysis of sensor attacks Lanotte et al [16], [17] propose formal approaches to model and analyze sensor attacks with a process calculus. The threat model allows attacks that manipulate sensor readings or control commands to compromise state.…”
Section: Related Workmentioning
confidence: 99%
“…However, relatively little work considers formal verification of such systems in the presence of sensor attacks. Some recent work emphasize timing aspects of sensor-related attacks [16], [17]; however, the work model the system's dynamics as a deterministic discrete time dynamical system, whereas most cyber-physical systems are best modeled with a nondeterministic combination of discrete and continuous dynamics.…”
Section: Introductionmentioning
confidence: 99%
“…In this respect, the two main options were Uppaal-SMC [8] and modes. In [24], we tested Uppaal-SMC for the security analysis of the simple engine verified in [23] using prohver. From these two experiences, we realized that HMODEST provides us with a better and clearer representation of complex cyber-physical systems and cyber-physical attacks.…”
Section: Conclusion Related and Future Workmentioning
confidence: 99%
“…Fist of all, we introduce a formal language to specify controller programs. For this very purpose, we resort to process calculi, a successful and widespread formal approach in concurrency theory for representing complex systems, such as mobile systems [11] and cyberphysical systems [30], and used in many areas, including verification of security protocols [1,2] and security analysis of cyber-physical attacks [29]. Thus, we define a simple timed process calculus, based on Hennessy and Regan's Timed Process Language (TPL) [21], for specifying controllers, finite-state edit automata, and networks of communicating monitored controllers.…”
Section: Introductionmentioning
confidence: 99%