In this letter, we investigate how to make use of model reduction techniques to identify the vulnerability of a closed-loop system, consisting of a plant and a supervisor, that might invite attacks. Here, the system vulnerability refers to the existence of key observation sequences that could be exploited by a specific smart sensor attack to cause damage infliction. We consider a nondeterministic smart attack, i.e., there might exist more than one attack choice over each received observation, and adopt our previously proposed modeling framework, where such an attack is captured by a standard finite-state automaton. For a given supervisor S and a smart sensor attack model A, another smart attack model {\mathrm{ A}}' is called attack equivale...
Although adverse effects of attacks have been acknowledged in many cyber-physical systems, there is ...
This paper addresses the problem of detection and reconstruction of cyber-attacks corrupting states ...
International audienceWe consider feedback control systems where sensor readings may be compromised ...
One key challenge of cybersecurity of discrete event systems (DES) is how to ensure system resilienc...
Cybersecurity of discrete event systems (DES) has been gaining more and more attention recently, due...
One of the major challenges about cyber–physical systems is how to protect system integrity from cyb...
1. Chapter 3. The problem of state estimation under sensor attack is formalized; harmful attacks are...
The development of cyber-physical systems (CPS) has brought much attention of researchers to cyber-a...
One of the major challenges about cyber physical systems is how to prevent cyber attacks to ensure s...
Industrial Control Systems (ICSs) rely on insecure protocols and devices to monitor and operate crit...
AbstractWe consider the problem of generating sensor spoofing attacks on feedback controllers. The a...
This paper describes how to design and implement a mechanism that helps to mitigate sensor attacks o...
Attacks on sensor measurements can take the system to an unwanted state. The disadvantage of using a...
Thesis: S.M., Massachusetts Institute of Technology, Department of Mechanical Engineering, 2019Catal...
International audienceWe consider feedback control systems where sensor readings and actuator comman...
Although adverse effects of attacks have been acknowledged in many cyber-physical systems, there is ...
This paper addresses the problem of detection and reconstruction of cyber-attacks corrupting states ...
International audienceWe consider feedback control systems where sensor readings may be compromised ...
One key challenge of cybersecurity of discrete event systems (DES) is how to ensure system resilienc...
Cybersecurity of discrete event systems (DES) has been gaining more and more attention recently, due...
One of the major challenges about cyber–physical systems is how to protect system integrity from cyb...
1. Chapter 3. The problem of state estimation under sensor attack is formalized; harmful attacks are...
The development of cyber-physical systems (CPS) has brought much attention of researchers to cyber-a...
One of the major challenges about cyber physical systems is how to prevent cyber attacks to ensure s...
Industrial Control Systems (ICSs) rely on insecure protocols and devices to monitor and operate crit...
AbstractWe consider the problem of generating sensor spoofing attacks on feedback controllers. The a...
This paper describes how to design and implement a mechanism that helps to mitigate sensor attacks o...
Attacks on sensor measurements can take the system to an unwanted state. The disadvantage of using a...
Thesis: S.M., Massachusetts Institute of Technology, Department of Mechanical Engineering, 2019Catal...
International audienceWe consider feedback control systems where sensor readings and actuator comman...
Although adverse effects of attacks have been acknowledged in many cyber-physical systems, there is ...
This paper addresses the problem of detection and reconstruction of cyber-attacks corrupting states ...
International audienceWe consider feedback control systems where sensor readings may be compromised ...