2018 IEEE 23rd Pacific Rim International Symposium on Dependable Computing (PRDC) 2018
DOI: 10.1109/prdc.2018.00023
|View full text |Cite
|
Sign up to set email alerts
|

Determining Tolerable Attack Surfaces that Preserves Safety of Cyber-Physical Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(4 citation statements)
references
References 21 publications
0
4
0
Order By: Relevance
“…Finally, from a Dolev-Yao based attacker model, an analyzer provides the possible attacks and check if they are feasible, according to a set of security properties. Cheh et al [6] propose an optimization of [24] by considering physical layer interactions in the attacker model.…”
Section: Integrated Methodsmentioning
confidence: 99%
“…Finally, from a Dolev-Yao based attacker model, an analyzer provides the possible attacks and check if they are feasible, according to a set of security properties. Cheh et al [6] propose an optimization of [24] by considering physical layer interactions in the attacker model.…”
Section: Integrated Methodsmentioning
confidence: 99%
“…Cheh et al [6] analyzed the safety of railway systems corresponding to different classes of venomous actors based on to their abilities defined in the system access control. Initially, they constructed a hybrid automata that models a railway system, where each attack capability is defined as a pattern that represents its effects when appended to a component in the system.…”
Section: Related Workmentioning
confidence: 99%
“…Initially, they defined the zero state by inducing only the attacks that remain dynamically undetectable regardless the available information to the attack detector at the initial state. Cheh et al [6] and Chen et al [7] consider attacks that are initiated when the system starts the execution without showing the impact of each attack action on the behaviour of the system functionality. Further, they do not consider how to overcome them.…”
Section: Related Workmentioning
confidence: 99%
“…Kumar et al [20] introduced an attack-fault tree formalism to describe attack scenarios; they conduct formal analyses by using Uppaal-SMC in order to obtain quantitative estimations on the impact of both system failures and security threats. Cheh et al [4] used Uppaal-SMC to do statistical model checking on a railway system to assess the safety of the system under attack. Like us, they tied safety analyses to security analyses and consider an attack that manipulates the communication messages exchanged between the signaling components of the railway system (this affects the speed of the trains and the routes that they take).…”
Section: Conclusion Related and Future Workmentioning
confidence: 99%