Our system is currently under heavy load due to increased usage. We're actively working on upgrades to improve performance. Thank you for your patience.
2014
DOI: 10.1016/j.ijcip.2014.10.003
|View full text |Cite
|
Sign up to set email alerts
|

Vulnerabilities of cyber-physical systems to stale data—Determining the optimal time to launch attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
26
0

Year Published

2015
2015
2021
2021

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 50 publications
(26 citation statements)
references
References 19 publications
0
26
0
Order By: Relevance
“…The combination of these metrics was used to deliver a node ranking in a graphbased representation of electricity grids. Finally, in the recent work of Krotofil et al [26] and that of Genge and Siaterlis [14], the impact of attacks on the underlying physical process was measured as the time interval after which the system reaches its emergency shutdown limits.…”
Section: B Caiamentioning
confidence: 99%
See 2 more Smart Citations
“…The combination of these metrics was used to deliver a node ranking in a graphbased representation of electricity grids. Finally, in the recent work of Krotofil et al [26] and that of Genge and Siaterlis [14], the impact of attacks on the underlying physical process was measured as the time interval after which the system reaches its emergency shutdown limits.…”
Section: B Caiamentioning
confidence: 99%
“…These may alter legitimate control signals in order to cause important damages. Finally, studies such as the one of Krotofil et al [26] showed that sensor data analysis may be used to infer the optimal time for launching denial-of-service attacks on control signals. These examples are clear evidence on the necessity to address the security requirements of ICS networks at early design phases.…”
Section: Requirements and Approach Overviewmentioning
confidence: 99%
See 1 more Smart Citation
“…Cyber-physical systems with the help of sensors, actuators, computation, and communication components control the physical process [2]. Some observed information about physical phenomena, such as rotating speed, pressure, or temperature, is received by sensors.…”
Section: Introductionmentioning
confidence: 99%
“…An adversarial attack on these systems may change the behavior of controlled processes through modifying automation programs or modifying commands [2]. Any modification in the controller code changes the process behavior.…”
Section: Introductionmentioning
confidence: 99%