Threat Modelling of Cyber–Physical Systems Using an Applied π-Calculus

Livinus Obiora Nweke1, Goitom K. Weldehawaryat1, Stephen D. Wolthusen1,2
1Norwegian University of Science and Technology (NTNU), Gjøvik, Norway
2Royal Holloway, University of London, Egham, United Kingdom

Tài liệu tham khảo

Zetter, 2014 Palmer, 2020 NIST, 2012 Shostack, 2014 UcedaVelez, 2015 Alberts, 2003 Fernandez, 2016, Threat modeling in cyber-physical systems, 448 Sadi, 2015, Co-simulation platform for characterizing cyber attacks in cyber physical systems, 1244 Milner, 1992, A calculus of mobile processes, i, Inform. and Comput., 100, 1, 10.1016/0890-5401(92)90008-4 Sangiorgi, 2003 Abadi, 1999, A calculus for cryptographic protocols: The spi calculus, Inform. and Comput., 148, 1, 10.1006/inco.1998.2740 Abadi, 2001, Mobile values, new names, and secure communication, ACM SIGPLAN Notices, 36, 104, 10.1145/373243.360213 Kremer, 2005, Analysis of an electronic voting protocol in the applied pi calculus, 186 Lanotte, 2017, A calculus of cyber-physical systems, 10168, 115 Parrow, 2001, An introduction to the pi-calculus, 479 Mo, 2014, Detecting integrity attacks on SCADA systems, IEEE Trans. Control Syst. Technol., 22, 1396, 10.1109/TCST.2013.2280899 Pasqualetti, 2013, Attack detection and identification in cyber-physical systems, IEEE Trans. Autom. Control, 58, 2715, 10.1109/TAC.2013.2266831 Amin, 2009, Safe and secure networked control systems under denial-of-service attacks, 31 Doostmohammadian, 2014, Vulnerability of CPS inference to dos attacks Mo, 2009, Secure control against replay attacks Sánchez, 2019, Detection of replay attacks in cyber-physical systems using a frequency-based signature, J. Franklin Inst. B, 356, 2798, 10.1016/j.jfranklin.2019.01.005 Nweke, 2020, Adversary model for attacks against IEC 61850 real-time communication protocols Mo, 2010, False data injection attacks against state estimation in wireless sensor networks Beg, 2017, Detection of false-data injection attacks in cyber-physical DC microgrids, IEEE Trans. Ind. Inform., 13, 2693, 10.1109/TII.2017.2656905 Chen, 2019, Real-time identification of false data injection attacks: A novel dynamic-static parallel state estimation based mechanism, IEEE Access, 7, 95812, 10.1109/ACCESS.2019.2929785 Zalewski, 2013, Threat modeling for security assessment in cyberphysical systems, 10 Martins, 2015, Towards a systematic threat modeling approach for cyber-physical systems, 1 Khan, 2017, STRIDE-based threat modeling for cyber-physical systems, 1 Almohri, 2017, On threat modeling and mitigation of medical cyber-physical systems, 114 Rekik, 2018, Cyber-physical threats and vulnerabilities analysis for train control and monitoring systems, 1 Atif, 2018 Rocchetto, 2016, On attacker models and profiles for cyber-physical systems, 427 Adepu, 2016, Generalized attacker and attack models for cyber physical systems Adepu, 2016, An investigation into the response of a water treatment system to cyber attacks Nweke, 2020, A review of asset-centric threat modelling approaches, Int. J. Adv. Comput. Sci. Appl., 11, 1, 10.14569/IJACSA.2020.0110201 Krotofil, 2014, Vulnerabilities of cyber-physical systems to stale data - determining the optimal time to launch attacks, Int. J. Crit. Infrastruct. Prot., 7, 213, 10.1016/j.ijcip.2014.10.003 Hughes, 2014, Three tenets for secure cyber-physical system design and assessment, Vol. 9097, 90970A Plotkin, 1981 Milner, 1980, 174 Wu, 2018, Optimal data injection attacks in cyber-physical systems, IEEE Trans. Cybern., 48, 3302, 10.1109/TCYB.2018.2846365 Arapinis, 2014, Stateful applied pi calculus, 22, 10.1007/978-3-642-54792-8_2 Kordy, 2011, Foundations of attack–defense trees, 80, 10.1007/978-3-642-19751-2_6 Lamport, 1978, Time, clocks, and the ordering of events in a distributed system, Commun. ACM, 21, 558, 10.1145/359545.359563 Dolev, 1983, On the security of public key protocols, IEEE Trans. Inform. Theory, 29, 198, 10.1109/TIT.1983.1056650 International Electrotechnical Commission (IEC), 2011 Claveria, 2018, GOOSE Protocol: Ied’s smart solution for victoria university zone substation (VUZS) simulator based on IEC61850 standard, 730