2021
DOI: 10.1049/cps2.12020
|View full text |Cite
|
Sign up to set email alerts
|

Covert channels in stochastic cyber‐physical systems

Abstract: A covert channel is a communication channel that is not intended to exist, and that can be used to transfer information in a manner that violates the system security policy. Attackers can abuse such channels to exfiltrate sensitive information from cyber-physical systems (CPSs), for example to leak the confidential or proprietary parameters in a control system. Furthermore, attacks against CPSs can exploit the leaked information about the implementation of the control system, for example to determine optimal f… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 40 publications
0
2
0
Order By: Relevance
“…We assume that the attacker can launch covert attacks [42] as illustrated in Figure 2. The adversary, as shown in Step 2, controls a considerable number of EVCSs and can command a coordinated oscillatory load attack against the grid.…”
Section: Threat Modelmentioning
confidence: 99%
“…We assume that the attacker can launch covert attacks [42] as illustrated in Figure 2. The adversary, as shown in Step 2, controls a considerable number of EVCSs and can command a coordinated oscillatory load attack against the grid.…”
Section: Threat Modelmentioning
confidence: 99%
“…We point out that a more fine-grained classification scheme has been proposed, especially to uniform discrepancies between different research works dealing with network steganography and covert channels, even not limited to the network-wide case [11], [24]. Unfortunately, information hiding techniques are proliferating in almost every new protocol or network/computing framework [17], [18], IoT environment [19], [25], smart vehicle [26], or industrial control system [27], [28], just to mention the most popular or emerging scenarios. Concerning recent examples, [20] analyzes many opportunities that an attacker can exploit for creating a covert channel within the Network Time Protocol, whereas [13] investigates whether timing channels can be used to implement long-range communications across different continents.…”
Section: A Network Covert Channelsmentioning
confidence: 99%