AbstractWe consider the problem of generating sensor spoofing attacks on feedback controllers. The attacker has the option of remaining in a stealth mode – wherein it spoofs some sensor but only by an amount that is indistinguishable from noise. Later, the attacker can launch a full attack and try to force the system to get into an unsafe region. Using bounded model checking on an example adaptive cruise controller, we show that (1) remaining in a stealth mode is not very benefecial for the attacker, and (2) there is a phase transition between two classes of attacks: attacks that are small and indistinguishable, but that are unable to make the system unsafe by themselves, and attacks that are large, and possibly easily detected, but that ea...
International audienceWe consider feedback control systems where sensor readings and actuator comman...
International audienceWe consider feedback control systems where sensor readings and actuator comman...
\u3cp\u3eThe term stealthy has come to encompass a variety of techniques that attackers can employ t...
AbstractWe consider the problem of generating sensor spoofing attacks on feedback controllers. The a...
While attacks on information systems have for most prac- tical purposes binary outcomes (informa...
In this work, we study performance of perception-based control systems in the presence of attacks. W...
Doctor of PhilosophyDepartment of Computer ScienceGeorge AmariucaiMany critical infrastructures rely...
Doctor of PhilosophyDepartment of Computer ScienceGeorge AmariucaiMany critical infrastructures rely...
As more attention is paid to security in the context of control systems and as attacks occur to real...
Thesis: S.M., Massachusetts Institute of Technology, Department of Mechanical Engineering, 2019Catal...
In this technical note, the trade-off between the attack detectability and the performance degradati...
Controller confidentiality under sensor attacks refers to whether the internal states of the control...
Controller confidentiality under sensor attacks refers to whether the internal states of the control...
As more attention is paid to security in the context of control systems and as attacks occur to real...
International audienceWe consider feedback control systems where sensor readings and actuator comman...
International audienceWe consider feedback control systems where sensor readings and actuator comman...
International audienceWe consider feedback control systems where sensor readings and actuator comman...
\u3cp\u3eThe term stealthy has come to encompass a variety of techniques that attackers can employ t...
AbstractWe consider the problem of generating sensor spoofing attacks on feedback controllers. The a...
While attacks on information systems have for most prac- tical purposes binary outcomes (informa...
In this work, we study performance of perception-based control systems in the presence of attacks. W...
Doctor of PhilosophyDepartment of Computer ScienceGeorge AmariucaiMany critical infrastructures rely...
Doctor of PhilosophyDepartment of Computer ScienceGeorge AmariucaiMany critical infrastructures rely...
As more attention is paid to security in the context of control systems and as attacks occur to real...
Thesis: S.M., Massachusetts Institute of Technology, Department of Mechanical Engineering, 2019Catal...
In this technical note, the trade-off between the attack detectability and the performance degradati...
Controller confidentiality under sensor attacks refers to whether the internal states of the control...
Controller confidentiality under sensor attacks refers to whether the internal states of the control...
As more attention is paid to security in the context of control systems and as attacks occur to real...
International audienceWe consider feedback control systems where sensor readings and actuator comman...
International audienceWe consider feedback control systems where sensor readings and actuator comman...
International audienceWe consider feedback control systems where sensor readings and actuator comman...
\u3cp\u3eThe term stealthy has come to encompass a variety of techniques that attackers can employ t...