Modeling security in cyber–physical systems

Mike Burmester1, Emmanouil Magkos2, Vassilis Chrissikopoulos2
1Department of Computer Science, Florida State University, Tallahassee, Florida 32306-4530, USA
2Department of Informatics, Ionian University, Tsirigoti Square 7, 49100 Corfu, Greece

Tài liệu tham khảo

Alur, 1993, Hybrid automata, 209

Alur, 1994, A theory of timed automata, Theoretical Computer Science, 126, 183, 10.1016/0304-3975(94)90010-8

Babaoglu, 1987, On the reliability of consensus-based fault-tolerant distributed computing systems, ACM Transactions on Computer Systems, 5, 394, 10.1145/29868.31332

Bengtsson, 2003, Timed automata, 87

Blanke, 2006

M. Burmester, Y. Desmedt, T. Itoh, K. Sakurai, H. Shizuya, M. Yung, A progress report on subliminal-free channels, in: Proceedings of the First International Workshop on Information Hiding, 1996, pp. 157–168.

Burmester, 2009, Universally composable RFID identification and authentication protocols, ACM Transactions on Information and System Security, 12, 1, 10.1145/1513601.1513603

A. Cardenas, S. Amin, Z. Lin, Y. Huang, C. Huang, S. Sastry, Attacks against process control systems: risk assessment, detection and response, in: Proceedings of the Sixth ACM Symposium on Information, Computer and Communications Security, 2011, pp. 355–366.

Cardenas, 2009, Rethinking security properties, threat models and the design space in sensor networks, Ad Hoc Networks, 7, 1434, 10.1016/j.adhoc.2009.04.012

Chow, 2009, Where East meets West, Washington Quarterly (Center for Strategic and International Studies), 32, 77, 10.1080/01636600802552247

Cuijpers, 2008, Constitutive hybrid processes, Simulation, 84, 339, 10.1177/0037549708097215

Department of Homeland Security and Centre for the Protection of the National Infrastructure, Cyber Security Assessments of Industrial Control Systems, Washington, DC 〈www.us-cert.gov/control_systems/pdf/Cyber_Security_Assessments_of_Industrial_Control_Systems.pdf〉, 2010.

J. Eisenhauer, P. Donnelly, M. Ellis, M. O'Brien, Roadmap to Secure Control Systems in the Energy Sector, Energetics, Columbia, MD, 2006.

R. Ellison, D. Fisher, R. Linger, H. Lipson, T. Longstaff, N. Mead, Survivable Network Systems: An Emerging Discipline, Technical Report CMU/SEI-97-TR-013, Software Engineering Institute, Carnegie Mellon University, Pittsburgh, PA, 1997.

N. Falliere, L. Murchu, E. Chien, W32. Stuxnet Dossier, Symantec, Mountain View, California, 2011.

Hamlen, 2006, Computability classes for enforcement mechanisms, ACM Transactions on Programming Languages and Systems, 28, 175, 10.1145/1111596.1111601

R. Kisner, W. Manges, T. Mcintyre, J. Nutaro, J. Munro, P. Ewing, M. Howlader, P. Kuruganti, M. Olama, Cybersecurity Through Real-Time Distributed Control Systems, Technical Report ORNL/TM-2010/30, Oak Ridge National Laboratory, Oak Ridge, TN, 2010.

Koza, 1992

Lamport, 1997, Proving the correctness of multiprocess programs, IEEE Transactions on Software Engineering, 3, 125, 10.1109/TSE.1977.229904

Lamport, 1998, Proving possibility properties, Theoretical Computer Science, 206, 341, 10.1016/S0304-3975(98)00129-7

Levy, 2003, Crossover, IEEE Security and Privacy, 1, 71, 10.1109/MSECP.2003.1253573

N. Lynch, R. Segala, F. Vaandrager and H. Weinberg, Hybrid I/O automata, in: Proceedings of the DIMACS Workshop on Verification and Control of Hybrid Systems, 1995, pp. 496–510.

Mangard, 2007

B. McMillin, Personal communication, 2012.

I. Roychoudhury, M. Daigle, P. Mosterman, G. Biswas, X. Koutsoukos, A method for the efficient simulation of hybrid bond graphs, in: Proceedings of the International Conference on Bond Graph Modeling, 2007, pp. 177–184.

Schneier, 1999, Attack trees, Dr. Dobb's Journal, 24, 21

Seo, 2003, Toward an automated design method for multi-domain dynamic systems using bond graph and genetic programming, Mechatronics, 13, 851, 10.1016/S0957-4158(03)00006-0

G. Simmons, Personal communication, 1993.

Slay, 2007, Lessons learned from the Maroochy water breach, 73

Ten, 2008, Vulnerability assessment of cybersecurity for SCADA systems, IEEE Transactions on Power Systems, 23, 1836, 10.1109/TPWRS.2008.2002298