International audienceThis paper deals with the vulnerability analysis of cyber-physical systems subject to malicious actions. For this purpose, the considered system is assumed to be abstracted as a discrete event system. Labeled finite automata with inputs are used to model the system's behavior along with the information that circulates in both the input and output channels. In particular, we study here stealthy, i.e., undetectable, cyber-attacks that aim to drive the system from a given normal state to a set of forbidden states. We assume that the attacker has limited resources, i.e., a credit, to insert and delete control and sensors events. The proposed analysis evaluates the costs of such attacks on the controlled system depending on...
Abstract—Cyber-physical systems integrate computation, com-munication, and physical capabilities to ...
Cyber-physical systems have emerged as a key technology in the development of distributed and autono...
Conditional security assesses the security of an information and communication system in a specif...
International audienceThis paper concerns the security analysis of discrete event systems modeled wi...
This paper addresses the problem of cyber-attacks in discrete-event systems framework. Labeled finit...
In this thesis, the safety and security problems in Cyber-Physical Systems (CPSs) are addressed. In ...
One of the major challenges about cyber physical systems is how to prevent cyber attacks to ensure s...
In this article, we study the impact of stealthy attacks on the cyber-physical system (CPS) modeled ...
In this paper, we analyze the vulnerabilities due to integrity cyber attacks named zero-stealthy att...
Doctor of PhilosophyDepartment of Computer ScienceGeorge AmariucaiMany critical infrastructures rely...
Conditional security assesses the security of an information and communication system in a specifi...
Cyber-Physical Systems (CPS) offer close integration among computational elements, communication net...
One of the major challenges about cyber–physical systems is how to protect system integrity from cyb...
In this technical note, the trade-off between the attack detectability and the performance degradati...
Motivated by the attacks on control systems through the cyber (digital) part, we study how signal at...
Abstract—Cyber-physical systems integrate computation, com-munication, and physical capabilities to ...
Cyber-physical systems have emerged as a key technology in the development of distributed and autono...
Conditional security assesses the security of an information and communication system in a specif...
International audienceThis paper concerns the security analysis of discrete event systems modeled wi...
This paper addresses the problem of cyber-attacks in discrete-event systems framework. Labeled finit...
In this thesis, the safety and security problems in Cyber-Physical Systems (CPSs) are addressed. In ...
One of the major challenges about cyber physical systems is how to prevent cyber attacks to ensure s...
In this article, we study the impact of stealthy attacks on the cyber-physical system (CPS) modeled ...
In this paper, we analyze the vulnerabilities due to integrity cyber attacks named zero-stealthy att...
Doctor of PhilosophyDepartment of Computer ScienceGeorge AmariucaiMany critical infrastructures rely...
Conditional security assesses the security of an information and communication system in a specifi...
Cyber-Physical Systems (CPS) offer close integration among computational elements, communication net...
One of the major challenges about cyber–physical systems is how to protect system integrity from cyb...
In this technical note, the trade-off between the attack detectability and the performance degradati...
Motivated by the attacks on control systems through the cyber (digital) part, we study how signal at...
Abstract—Cyber-physical systems integrate computation, com-munication, and physical capabilities to ...
Cyber-physical systems have emerged as a key technology in the development of distributed and autono...
Conditional security assesses the security of an information and communication system in a specif...