Synthesis of covert actuator attackers for free
Tóm tắt
Từ khóa
Tài liệu tham khảo
Amin S, Litrico X, Sastry SS, Bayen AM (2010) Stealthy deception attacks on water SCADA systems. HSCC: 161–170
Arnold A, Vincent A, Walukiewicz I (2003) Games for synthesis of controllers with partial observation. Theor Comp Sci 303(1):7–34
Bergeron A (1993) A unified approach to control problems in discrete event processes. RAIRO-Theoretical Informatics and Applications 27(6):555–573
Carvalho LK, Wu YC, Kwong R, Lafortune S (2016) Detection and prevention of actuator enablement attacks in supervisory control systems. WODES: 298–305
Carvalho LK, Wu YC, Kwong R, Lafortune S (2018) Detection and mitigation of classes of attacks in supervisory control systems. Automatica 97:121–133
Forejt V, Kwiatkowska M, Norman G, Parker D (2011) Automated verification techniques for probabilistic systems. SFM: 53–113
Goes RM, Kang E, Kwong R, Lafortune S (2017) Stealthy deception attacks for cyber-physical systems. Conference on Decision and Control: 4224–4230
Hélouët L, Marchand H, Ricker L (2018) Opacity with powerful attackers. IFAC 51(7):464–471
Hopcroft JE, Ullman JD (1979) Introduction to automata theory, languages, and computation. Addison-Wesley, Reading
Jones A, Kong Z, Belta C (2014) Anomaly detection in cyber-physical systems: a formal methods approach. Conference on Decision and Control: 848–853
Kang E, Adepu S, Mathur A, Jackson D (2016) Model based security analysis of a water treatment system. SEsCPS: 22–28
Lanotte R, Merro M, Muradore R, Vigano L (2017) A formal approach to cyber-physical attacks. IEEE Computer Security Foundations Symposium: 436–450
Lei F, Wonham WM (2010) On the computation of natural observers in discrete-event systems. Discrete Event Dynamic Systems 20(1):63–102
Lima PM, Alves MVS, Carvalho LK, Moreira MV (2017) Security against network attacks in supervisory control systems. IFAC 50(1):12333–12338
Lima PM, Carvalho LK, Moreira MV (2018) Detectable and undetectable network attack security of cyber-physical systems. IFAC 51(7):179–185
Lin L, Thuijsman S, Zhu Y, Ware S, Su R, Reniers M (2019a) Synthesis of successful normal actuator attackers on normal supervisors. American Control Conference: 5614–5619
Lin L, Zhu Y, Su R (2019b) Towards bounded synthesis of resilient supervisors. Conference on Decision and Control, accepted
Mo Y, Kim HJ, Brancik K, Dickinson D, Lee H, Perrig A, Sinopoli B (2012) Cyber-physical security of a smart grid infrastructure. Proc. IEEE: 195–209
Pasqualetti F, Dorfler F, Bullo F (2013) Attack detection and identification in cyber-physical systems. IEEE Trans. Autom. Control 58(11):2715–2729
Rashidinejad A, Lin L, Wetzels BHJ, Zhu Y, Reniers M, Su R (2019) Supervisory control of discrete-event systems under attacks: an overview and outlook. European Control Conference, accepted
Rocchetto M, Tippenhauer NO (2017) Towards formal security analysis of industrial control systems. ACM Asia Conference on Computer and Communications Security: 114–126
Smith RS (2011) A decoupled feedback structure for covertly appropriating networked control systems. IFAC: 90–95
Su R (2018) Supervisor synthesis to thwart cyber-attack with bounded sensor reading alterations. Automatica 94:35–44
Teixeira A, Shames I, Sandberg H, Johansson KH (2012) Revealing stealthy attacks in control systems. 50th Annual Allerton conference on communication, control and computing
Wakaiki M, Tabuada P, Hespanha JP (2017) Supervisory control of discrete-event systems under attacks. arXiv:1701.00881v1
Wang Y, Bozkurt AK, Pajic M (2019) Attack-resilient supervisory control of discrete-event systems. arXiv:1904.03264
Wonham WM, Cai K (2018) Supervisory control of discrete-event systems. Monograph Series Communications and Control Engineering, Springer
Yin X, Lafortune S (2016) Synthesis of maximally permissive supervisors for partially observed discrete event systems. IEEE Trans Autom Control 61(5):1239–1254
Yin X, Li S (2018) Verification of opacity in networked supervisory control systems with insecure control channels. Conference on Decision and Control: 4851–4856
Zhu Y, Lin L, Su R (2018) Supervisor obfuscation against actuator enablement attack. European Control Conference: 1732–1739