Proceedings of the 1st ACM Workshop on Cyber-Physical System Security 2015
DOI: 10.1145/2732198.2732208
|View full text |Cite
|
Sign up to set email alerts
|

Cyber-Physical Systems Security

Abstract: In recent years, cyber-physical systems (CPSs) have received much attention from both the academic world and the industrial world, which refer to a deep integration and coordination of physical and computational resources [1,2]. Typical examples of CPSs can be found in smart grids, smart transportation systems, industrial control systems, water supply systems, and so on. Furthermore, many military systems are also CPSs. The key characteristic of CPSs is the integration of computing, control and communication. … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2016
2016
2020
2020

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 37 publications
(3 citation statements)
references
References 14 publications
(19 reference statements)
0
3
0
Order By: Relevance
“…This breach of integrity in the physical layer can have critical, even catastrophic results, as faulty input data results in non-ideal control decisions that may lead to entirely unpredicted effects in the physical realm. These attacks can be conducted by accessing and manipulating internal nodes of the network, or employing external nodes to obtain system information or incapacitate the system operation [90].…”
Section: Threats On Physical Layermentioning
confidence: 99%
“…This breach of integrity in the physical layer can have critical, even catastrophic results, as faulty input data results in non-ideal control decisions that may lead to entirely unpredicted effects in the physical realm. These attacks can be conducted by accessing and manipulating internal nodes of the network, or employing external nodes to obtain system information or incapacitate the system operation [90].…”
Section: Threats On Physical Layermentioning
confidence: 99%
“…Gollmann and Krotofil highlight in [26] that "to work on cyberphysical systems, one has to combine the devious mind of the security expert with the technical expertise of the control engineer. " Unfortunately, this expertise is "not commonly found in the IT security community, " according to the authors of [25]. Moreover, this lack of expertise is worsened by the language barrier between the disciplines of control theory and IT security.…”
Section: Control Theory Preliminariesmentioning
confidence: 99%
“…However, as stated in [13], the major distinction of control systems with respect to other IT systems is the interaction with the physical world. In [25], the authors state that CPSs security is specifically concerned with attacks that cause physical impact; since IT security mechanisms do not usually account for the physical part of the system, they are thus ineffective against attacks that either target or exploit the physical components of CPSs. In this section, we present an Information Flow (IF) inspired integrity analysis for CPSs which accounts for the physical process.…”
Section: Quantitative Integrity Analysis On Cpsmentioning
confidence: 99%