The problem of stealthy attacks for partially-observed discrete event systems is considered. An operator observes the plant through an observation mask that does not allow him to detect the occurrence of certain events (silent events). The observation is corrupted by an intruder who can insert and erase some sensor readings. We construct an attack structure A which guarantees that, when the plant reaches an unsafe state, A can make the operator think that the plant is in a safe state. Based on A, we can obtain a stealthy attack structure As by simply removing from A all the exposing states, all the weakly exposing states and their input and output arcs. The stealthy attack structure As only contains the possible attacks that can not be dete...
International audienceThis paper deals with the vulnerability analysis of cyber-physical systems sub...
This paper studies the impact of side initial state information on the detectability of data decepti...
This paper proposes a passive methodology for detecting a class of stealthy intermittent integrity a...
The problem of stealthy attacks for partially-observed discrete event systems is considered. An oper...
In this paper we consider the problem of joint state estimation under attack in partially-observed d...
As more attention is paid to security in the context of control systems and as attacks occur to real...
1. Chapter 3. The problem of state estimation under sensor attack is formalized; harmful attacks are...
While attacks on information systems have for most prac- tical purposes binary outcomes (informa...
Inspired by privacy problems where the behavior of a system should not be revealed to an external cu...
Stealthy attacks in sensor and actuator loops are the research priorities in the security of cyber-p...
The problem of stealthy sensor attacks for labeled Petri nets is considered. An operator observes th...
AbstractWe consider the problem of generating sensor spoofing attacks on feedback controllers. The a...
This paper addresses the problem of cyber-attacks in discrete-event systems framework. Labeled finit...
Thesis: S.M., Massachusetts Institute of Technology, Department of Mechanical Engineering, 2019Catal...
In this technical note, the trade-off between the attack detectability and the performance degradati...
International audienceThis paper deals with the vulnerability analysis of cyber-physical systems sub...
This paper studies the impact of side initial state information on the detectability of data decepti...
This paper proposes a passive methodology for detecting a class of stealthy intermittent integrity a...
The problem of stealthy attacks for partially-observed discrete event systems is considered. An oper...
In this paper we consider the problem of joint state estimation under attack in partially-observed d...
As more attention is paid to security in the context of control systems and as attacks occur to real...
1. Chapter 3. The problem of state estimation under sensor attack is formalized; harmful attacks are...
While attacks on information systems have for most prac- tical purposes binary outcomes (informa...
Inspired by privacy problems where the behavior of a system should not be revealed to an external cu...
Stealthy attacks in sensor and actuator loops are the research priorities in the security of cyber-p...
The problem of stealthy sensor attacks for labeled Petri nets is considered. An operator observes th...
AbstractWe consider the problem of generating sensor spoofing attacks on feedback controllers. The a...
This paper addresses the problem of cyber-attacks in discrete-event systems framework. Labeled finit...
Thesis: S.M., Massachusetts Institute of Technology, Department of Mechanical Engineering, 2019Catal...
In this technical note, the trade-off between the attack detectability and the performance degradati...
International audienceThis paper deals with the vulnerability analysis of cyber-physical systems sub...
This paper studies the impact of side initial state information on the detectability of data decepti...
This paper proposes a passive methodology for detecting a class of stealthy intermittent integrity a...