2022
DOI: 10.1007/s10626-021-00356-y
|View full text |Cite
|
Sign up to set email alerts
|

Observation-assisted heuristic synthesis of covert attackers against unknown supervisors

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
14
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
3
1

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(14 citation statements)
references
References 26 publications
0
14
0
Order By: Relevance
“…Recently, we have considered a more practical setup where the model of the supervisor is not available to the adversary [24]. To compensate the lack of knowledge on the model of the supervisor, it is assumed in [24] that the adversary has recorded a (prefix-closed) finite set of observations of the runs of the closed-loop system. In this more challenging setup, a covert attacker needs to be synthesized based solely on the model of the plant and the given set of observations.…”
Section: Introductionmentioning
confidence: 99%
See 4 more Smart Citations
“…Recently, we have considered a more practical setup where the model of the supervisor is not available to the adversary [24]. To compensate the lack of knowledge on the model of the supervisor, it is assumed in [24] that the adversary has recorded a (prefix-closed) finite set of observations of the runs of the closed-loop system. In this more challenging setup, a covert attacker needs to be synthesized based solely on the model of the plant and the given set of observations.…”
Section: Introductionmentioning
confidence: 99%
“…The difficulty of this synthesis problem lies in the fact that there can be in general an infinite number of supervisors which are consistent with the observations, rendering the synthesis approaches developed in the existing works ineffective. In [24], we have proposed a technique to compute covert damage-reachable attackers by formulating it as an instance of the supervisor synthesis problem on certain surrogate plant model, which is constructed without using the model of the supervisor. Due to the overapproximation in the surrogate plant model, the synthesized attacker in [24] cannot ensure the maximal permissiveness in general.…”
Section: Introductionmentioning
confidence: 99%
See 3 more Smart Citations