2011 IEEE International Conference on Technologies for Homeland Security (HST) 2011
DOI: 10.1109/ths.2011.6107875
|View full text |Cite
|
Sign up to set email alerts
|

System-aware security for nuclear power systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
4
0

Year Published

2012
2012
2021
2021

Publication Types

Select...
4
2

Relationship

1
5

Authors

Journals

citations
Cited by 7 publications
(4 citation statements)
references
References 8 publications
0
4
0
Order By: Relevance
“…For example, the operation of a turbine may be automatically controlled, but operators can observe critical information regarding the turbine's operation, such as vibration levels, temperature, and rotation rate. If the operator observes measurements that are outside the designated region of proper operation, specific manual actions can be required of the operator in order to avoid undesirable consequences [Jones, Nguyen, and Horowitz, 2011]. However, as was the case in the Stuxnet attacks, a cyber attacker can not only manipulate a physical system's performance through infections in its control system, but also can manipulate data presented to operators; data that can, when utilized within standard operating procedures, either stimulate inappropriate control actions or serve to prevent needed control actions on an operator's part.…”
Section: Introductionmentioning
confidence: 99%
“…For example, the operation of a turbine may be automatically controlled, but operators can observe critical information regarding the turbine's operation, such as vibration levels, temperature, and rotation rate. If the operator observes measurements that are outside the designated region of proper operation, specific manual actions can be required of the operator in order to avoid undesirable consequences [Jones, Nguyen, and Horowitz, 2011]. However, as was the case in the Stuxnet attacks, a cyber attacker can not only manipulate a physical system's performance through infections in its control system, but also can manipulate data presented to operators; data that can, when utilized within standard operating procedures, either stimulate inappropriate control actions or serve to prevent needed control actions on an operator's part.…”
Section: Introductionmentioning
confidence: 99%
“…The authors of [47] laid out a new systems-engineering-focused approach for addressing threats to NPPs, which they named System-Aware Security (SAS) for NPPs. The authors theoretically demonstrated a possible application of the methodology in order to address cyber attacks employed via embedded infections in NP systems.…”
mentioning
confidence: 99%
“…To this extent, this study develops, and validates detection methods based on the behavior of residuals between disparate navigation units commonly used in UAV navigation. Section 3.1 argues for the use of a set of diverse, redundant navigation components to diminish the chances of adversarial supply chain attacks [7,21].…”
Section: Section 3: Methodsmentioning
confidence: 99%
“…Jones et al [7] introduces architecture has been conceptually applied to controllers for nuclear power systems [21] and shipboard control systems [22] using design patterns under the System-Aware umbrella. Unlike the traditional perimeter defense where users are interested in authentication, signature defense, information anomalies, etc., System-Aware simplified defense to fact-checking and searching for inconsistencies among its critical components.…”
Section: System-aware Cyber Securitymentioning
confidence: 99%