Designing secure cyber-physical systems (CPS) is fundamentally important and performing vulnerability assessment becomes indispensable. In this paper, we discuss our ongoing work on building an automated mission-aware vulnerability CPS assessment framework that can accomplish three objectives including i) mapping CPS missions into infrastructural components, ii) evaluating global impact of each vulnerability, and iii) achieving verifiable results and high flexibility. In order to accomplish these objectives, we follow a model-assisted analysis strategy. Specifically, we take advantage of CPS simulator to model the behaviors of CPS components under different missions, our framework facilitates a bottom-up approach to construct a holistic mod...
Cyber-physical systems (CPS) comprise the backbone of national critical infrastructures such as powe...
Current vulnerability scoring mechanisms in complex cyber-physical systems (CPSs) face challenges in...
Vulnerability is defined as ”weakness of an asset or control that can be exploited by a threat” acco...
Designing secure cyber-physical systems (CPS) is fundamentally important and performing vulnerabilit...
Designing secure cyber-physical systems (CPS) is fundamentally important. An indispensable step towa...
Since Cyber-Physical Systems (CPS) are widely used in critical infrastructures, it is essential to p...
The ability to network machinery and devices that are otherwise isolated is highly attractive to ind...
The increased computational power and connectivity in modern Cyber-Physical Systems (CPS) inevitably...
Cyber-physical systems (CPSs) are complex systems that evolve from the integrations of components de...
Assessing vulnerabilities supports analytics-based decision-making processes to protect Critical Inf...
A cyber-physical system (CPS) is a combination of physical system components with cyber capabilities...
Criticalmanufacturingprocessesinsmartnetworkedsystems such as Cyber-Physical Production Systems (CPP...
The world today increasingly relies upon the usage of smart devices which have the capability to com...
Despite their wide proliferation, complex cyber–physical systems (CPSs) are subject to cybersecurity...
There is continuing growth in the need to secure critical infrastructures from malicious adversaries...
Cyber-physical systems (CPS) comprise the backbone of national critical infrastructures such as powe...
Current vulnerability scoring mechanisms in complex cyber-physical systems (CPSs) face challenges in...
Vulnerability is defined as ”weakness of an asset or control that can be exploited by a threat” acco...
Designing secure cyber-physical systems (CPS) is fundamentally important and performing vulnerabilit...
Designing secure cyber-physical systems (CPS) is fundamentally important. An indispensable step towa...
Since Cyber-Physical Systems (CPS) are widely used in critical infrastructures, it is essential to p...
The ability to network machinery and devices that are otherwise isolated is highly attractive to ind...
The increased computational power and connectivity in modern Cyber-Physical Systems (CPS) inevitably...
Cyber-physical systems (CPSs) are complex systems that evolve from the integrations of components de...
Assessing vulnerabilities supports analytics-based decision-making processes to protect Critical Inf...
A cyber-physical system (CPS) is a combination of physical system components with cyber capabilities...
Criticalmanufacturingprocessesinsmartnetworkedsystems such as Cyber-Physical Production Systems (CPP...
The world today increasingly relies upon the usage of smart devices which have the capability to com...
Despite their wide proliferation, complex cyber–physical systems (CPSs) are subject to cybersecurity...
There is continuing growth in the need to secure critical infrastructures from malicious adversaries...
Cyber-physical systems (CPS) comprise the backbone of national critical infrastructures such as powe...
Current vulnerability scoring mechanisms in complex cyber-physical systems (CPSs) face challenges in...
Vulnerability is defined as ”weakness of an asset or control that can be exploited by a threat” acco...