2018
DOI: 10.1109/msp.2018.3761722
|View full text |Cite
|
Sign up to set email alerts
|

Fingerprinting for Cyber-Physical System Security: Device Physics Matters Too

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
7
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 24 publications
(7 citation statements)
references
References 4 publications
0
7
0
Order By: Relevance
“…Several different approaches have emerged over the last few years for detecting and preventing CPS attacks. These include techniques based on anomaly detection, where the logs of the physical data are analysed to identify suspicious events and anomalous behaviours [7,12,17,22,28,32,40,44,45,47,49,51,54,57,60,65,66]; digital fingerprinting, where sensors are checked for spoofing by monitoring time and frequency domain features from sensor and process noise [13,35,43,50,79]; and invariant-based checkers, which monitor for violations of invariant properties over sensor and actuator states [8,9,11,20,24,25,29,39,73,81]. A key difference between many of these works and ours, aside from the specific target of code modification attacks, is the need for either significant amounts of data from the real system (for training), or knowledge of the underlying processes and control operations (e.g.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Several different approaches have emerged over the last few years for detecting and preventing CPS attacks. These include techniques based on anomaly detection, where the logs of the physical data are analysed to identify suspicious events and anomalous behaviours [7,12,17,22,28,32,40,44,45,47,49,51,54,57,60,65,66]; digital fingerprinting, where sensors are checked for spoofing by monitoring time and frequency domain features from sensor and process noise [13,35,43,50,79]; and invariant-based checkers, which monitor for violations of invariant properties over sensor and actuator states [8,9,11,20,24,25,29,39,73,81]. A key difference between many of these works and ours, aside from the specific target of code modification attacks, is the need for either significant amounts of data from the real system (for training), or knowledge of the underlying processes and control operations (e.g.…”
Section: Related Workmentioning
confidence: 99%
“…Compromising any one of these components or PLCs can potentially allow an attacker to manipulate the system into a damaging physical state. This has motivated a huge variety of research into defending and assessing CPSs, spanning techniques based on anomaly detection [7,12,17,22,28,32,39,40,44,45,47,49,51,54,57,60,65,66], fingerprinting [13,35,43,50,79], invariant-based monitoring [8,9,11,20,24,25,29,73,81], trusted execution environments [70], and fuzzing [26,27,78].…”
Section: Introductionmentioning
confidence: 99%
“…A malicious node could launch a routing attack to control data traffic, to degrade network performance (e.g., sinkhole, worm hole), or to deplete network resources, such as energy or bandwidth, (e.g., flooding, rushing attack) [7,8]. For the case of critical infrastructure cyber-physical systems, network attacks may imply potential economic and human losses, thus, it is important to protect RWN from these threats [9,10].…”
Section: Introductionmentioning
confidence: 99%
“…Given the potential impact of cyber-attacks on these systems [46,51,60], ensuring their security and protection has become a more important goal than ever before. The different temporal scales, modalities, and process interactions in CPSs, however, pose a significant challenge for solutions to overcome, and have led to a variety of research into different possible countermeasures, including ones based on anomaly detection [11,15,27,45,48,52,58,61,66,69,71], fingerprinting [12,13,44,56], invariant-based monitoring [7,8,10,18,24,25,28,39,82], and trusted execution environments [74].…”
Section: Introductionmentioning
confidence: 99%