A formal verification approach to revealing stealth attacks on networked control systems

10Citations
Citations of this article
13Readers
Mendeley users who have this article in their library.
Get full text

Abstract

We develop methods to determine if networked control systems can be compromised by stealth attacks, and derive design strategies to secure these systems. A stealth attack is a form of a cyber-physical attack where the adversary compromises the information between the plant and the controller, with the intention to drive the system into a bad state and at the same time stay undetected. We define the discovery problem as a formal verification problem, where generated counterexamples (if any) correspond to actual at- tack vectors. The analysis is entirely performed in Simulink, using Simulink Design Verifier as the verification engine. A small case study is presented to illustrate the results, and a branch-and-bound algorithm is proposed to perform optimal system securing. Copyright is held by the author/owner(s).

Cite

CITATION STYLE

APA

Trčka, N., Moulin, M., Bopardikar, S., & Speranzon, A. (2014). A formal verification approach to revealing stealth attacks on networked control systems. In HiCoNS 2014 - Proceedings of the 3rd International Conference on High Confidence Networked Systems (Part of CPS Week) (pp. 67–75). Association for Computing Machinery. https://doi.org/10.1145/2566468.2566484

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free