2015 International Conference on Hardware/Software Codesign and System Synthesis (CODES+ISSS) 2015
DOI: 10.1109/codesisss.2015.7331365
|View full text |Cite
|
Sign up to set email alerts
|

Design methodologies for securing cyber-physical systems

Abstract: Cyber-Physical Systems (CPS) are in most cases safety-and mission-critical. Standard design techniques used for securing embedded systems are not suitable for CPS due to the restricted computation and communication budget available in the latter. In addition, the sensitivity of sensed data and the presence of actuation components further increase the security requirements of CPS. To address these issues, it is necessary to provide new design methods in which security is considered from the beginning of the who… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
17
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
4
2
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 23 publications
(17 citation statements)
references
References 51 publications
0
17
0
Order By: Relevance
“…[17], proposed a unified framework that consist of three orthogonal coordinates namely: (1) from the security perspective, the authors followed the well-known taxonomy of threats, vulnerabilities, attacks and controls. (2) from the CPS components perspective, the authors focused on cyber, physical and cyber-physical components: (3) from the CPS systems perspective, the authors explored general CPS features as well as the representative systems such as smart grids, medical CPS and smart cars. The model was both abstract to capture the general interactions of a CPS application and specific to capture any details when needed.…”
Section: Cps Risk Management Frameworkmentioning
confidence: 99%
See 1 more Smart Citation
“…[17], proposed a unified framework that consist of three orthogonal coordinates namely: (1) from the security perspective, the authors followed the well-known taxonomy of threats, vulnerabilities, attacks and controls. (2) from the CPS components perspective, the authors focused on cyber, physical and cyber-physical components: (3) from the CPS systems perspective, the authors explored general CPS features as well as the representative systems such as smart grids, medical CPS and smart cars. The model was both abstract to capture the general interactions of a CPS application and specific to capture any details when needed.…”
Section: Cps Risk Management Frameworkmentioning
confidence: 99%
“…The authors discussed a multidisciplinary modeling, simulation, tools, and software synthesis challenges for CPS. [2], proposed a security aware model based on design in methods to assess the security of CPS within four types of architecture level attacks. The group exploits the observations by identifying and fixing problems at early stage of the system development is economically beneficial.…”
Section: Cps Risk Management Frameworkmentioning
confidence: 99%
“…Of particular concern is their vulnerability to signal spoofing attacks [3]. As a result, many researchers are designing algorithms that enable an observer to detect and mitigate signal spoofing attacks (e.g., [4]- [9]). We study the problem from the opposite (i.e., the attacker's) point-of-view.…”
Section: Introductionmentioning
confidence: 99%
“…They also discuss the importance of developing new adversary models for CPS. In [11], the authors suggest a security design for CPS that considers specific common characteristics of CPSs, such as the CPS environment, real-time requirements, uncertainty and geographic distribution. Further, [11] indicates that taking care of security in CPSs should start at the very beginning of the designing phase by developing new appropriate security tools that meet the specific system requirements.…”
Section: Related Workmentioning
confidence: 99%
“…In [11], the authors suggest a security design for CPS that considers specific common characteristics of CPSs, such as the CPS environment, real-time requirements, uncertainty and geographic distribution. Further, [11] indicates that taking care of security in CPSs should start at the very beginning of the designing phase by developing new appropriate security tools that meet the specific system requirements. In [12] the authors focus on being aware of the security issue, starting in the CPS design phase, by considering it to be the main part of the CPS developing process.…”
Section: Related Workmentioning
confidence: 99%