International audienceWe address detection of attacks against cyber-physical systems. Cyber-physical systems are industrial control systems upgraded with novel computing, communication and interconnection capabilities. In this paper we reexamine the security of a detection scheme proposed by Mo and Sinopoli (2009) and Mo et al. (2015). The approach complements the use of Kalman filters and linear quadratic regulators, by adding an authentication watermark signal for the detection of integrity attacks. We show that the approach only detects cyber adversaries, i.e., attackers with the ability to eavesdrop information from the system, but that do not attempt to acquire any knowledge about the system model itself. The detector fails at covering...
This paper considers the problem of designing physical watermark signals to protect a control system...
In this paper, we investigate the role of a physical watermarking signal in quickest detection of a ...
This paper addresses the design of an active cyberattack detection architecture based on multiplicat...
International audienceThe use of control-theoretic solutions to detect attacks against cyber-physica...
Cyber-Physical Systems (CPS) offer close integration among computational elements, communication net...
We address security issues in cyber-physical industrial systems. Attacks against these systems shall...
Cyber Physical Systems (CPSs) are considered as an integration of computing, networking, and physica...
This article addresses the detection of stealthy attacks on sensor measurements. Inspired in authent...
Thesis: S.M., Massachusetts Institute of Technology, Department of Mechanical Engineering, 2019Catal...
Cyber-physical systems (CPS) face tremendous threats in modern society. Indeed their presence incrit...
Cyber-attacks long have been a topic reserved for sci-fi movies and books. With the advance of inter...
Security issues of Cyber-Physical Systems (CPS) are of great significance since cyber attacks may ca...
<p>A SCADA system employing the distributed networks of sensors and actuators that interact with the...
Abstract—Cyber-physical systems integrate computation, com-munication, and physical capabilities to ...
International audienceSeveral works are aiming to develop techniques allowing detecting False Data I...
This paper considers the problem of designing physical watermark signals to protect a control system...
In this paper, we investigate the role of a physical watermarking signal in quickest detection of a ...
This paper addresses the design of an active cyberattack detection architecture based on multiplicat...
International audienceThe use of control-theoretic solutions to detect attacks against cyber-physica...
Cyber-Physical Systems (CPS) offer close integration among computational elements, communication net...
We address security issues in cyber-physical industrial systems. Attacks against these systems shall...
Cyber Physical Systems (CPSs) are considered as an integration of computing, networking, and physica...
This article addresses the detection of stealthy attacks on sensor measurements. Inspired in authent...
Thesis: S.M., Massachusetts Institute of Technology, Department of Mechanical Engineering, 2019Catal...
Cyber-physical systems (CPS) face tremendous threats in modern society. Indeed their presence incrit...
Cyber-attacks long have been a topic reserved for sci-fi movies and books. With the advance of inter...
Security issues of Cyber-Physical Systems (CPS) are of great significance since cyber attacks may ca...
<p>A SCADA system employing the distributed networks of sensors and actuators that interact with the...
Abstract—Cyber-physical systems integrate computation, com-munication, and physical capabilities to ...
International audienceSeveral works are aiming to develop techniques allowing detecting False Data I...
This paper considers the problem of designing physical watermark signals to protect a control system...
In this paper, we investigate the role of a physical watermarking signal in quickest detection of a ...
This paper addresses the design of an active cyberattack detection architecture based on multiplicat...