2016 Science of Security for Cyber-Physical Systems Workshop (SOSCYPS)

11-11 April 2016

Filter Results

Displaying Results 1 - 10 of 10
  • [Title page]

    Publication Year: 2016, Page(s): 1
    Request permission for reuse | PDF file iconPDF (54 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2016, Page(s): 1
    Request permission for reuse | PDF file iconPDF (58 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2016, Page(s): 1
    Request permission for reuse | PDF file iconPDF (78 KB)
    Freely Available from IEEE
  • Science of Security Cyber Physical Systems Workshop Program

    Publication Year: 2016, Page(s):1 - 2
    Request permission for reuse | PDF file iconPDF (175 KB)
    Freely Available from IEEE
  • Accountability in cyber-physical systems

    Publication Year: 2016, Page(s):1 - 3
    Cited by:  Papers (4)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (86 KB) | HTML iconHTML

    Our position is that a key component of securing cyber-physical systems (CPS) is to develop a theory of accountability that encompasses both control and computing systems. We envision that a unified theory of accountability in CPS can be built on a foundation of causal information flow analysis. This theory will support design and analysis of mechanisms at various stages of the accountability regi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Advances and challenges of quantitative verification and synthesis for cyber-physical systems

    Publication Year: 2016, Page(s):1 - 5
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (84 KB) | HTML iconHTML

    We are witnessing a huge growth of cyber-physical systems, which are autonomous, mobile, endowed with sensing, controlled by software, and often wirelessly connected and Internet-enabled. They include factory automation systems, robotic assistants, self-driving cars, and wearable and implantable devices. Since they are increasingly often used in safety- or business-critical contexts, to mention in... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A set-theoretic approach for secure and resilient control of Cyber-Physical Systems subject to false data injection attacks

    Publication Year: 2016, Page(s):1 - 5
    Cited by:  Papers (4)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (335 KB) | HTML iconHTML

    In this paper a novel set-theoretic control framework for Cyber-Physical Systems is presented. By resorting to set-theoretic ideas, an anomaly detector module and a control remediation strategy are formally derived with the aim to contrast cyber False Data Injection (FDI) attacks affecting the communication channels. The resulting scheme ensures Uniformly Ultimate Boundedness and constraints fulfi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • From control system security indices to attack identifiability

    Publication Year: 2016, Page(s):1 - 6
    Cited by:  Papers (5)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (222 KB) | HTML iconHTML

    In this paper, we investigate detectability and identifiability of attacks on linear dynamical systems that are subjected to external disturbances. We generalize a concept for a security index, which was previously introduced for static systems. The index exactly quantifies the resources necessary for targeted attacks to be undetectable and unidentifiable in the presence of disturbances. This info... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Security games on infrastructure networks

    Publication Year: 2016, Page(s):1 - 4
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (47 KB) | HTML iconHTML

    The theory of robust control models the controller-disturbance interaction as a game where disturbance is nonstrategic. The proviso of a deliberately malicious (strategic) attacker should be considered to increase the robustness of infrastructure systems. This has become especially important since many IT systems supporting critical functionalities are vulnerable to exploits by attackers. While th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Towards foundational verification of cyber-physical systems

    Publication Year: 2016, Page(s):1 - 5
    Cited by:  Papers (4)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (217 KB) | HTML iconHTML

    The safety-critical aspects of cyber-physical systems motivate the need for rigorous analysis of these systems. In the literature this work is often done using idealized models of systems where the analysis can be carried out using high-level reasoning techniques such as Lyapunov functions and model checking. In this paper we present VERIDRONE, a foundational framework for reasoning about cyber-ph... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.