2021
DOI: 10.1145/3451169
|View full text |Cite
|
Sign up to set email alerts
|

Analysing Mission-critical Cyber-physical Systems with AND/OR Graphs and MaxSAT

Abstract: Cyber-Physical Systems (CPS) often involve complex networks of interconnected software and hardware components that are logically combined to achieve a common goal or mission; for example, keeping a plane in the air or providing energy to a city. Failures in these components may jeopardise the mission of the system. Therefore, identifying the minimal set of critical CPS components that is most likely to fail, and prevent the global system from accomplishing its mission, becomes essential to ensure reliability.… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(2 citation statements)
references
References 67 publications
(92 reference statements)
0
2
0
Order By: Relevance
“…Stellios et al modeled both the cyber connectivity and physical interactions to prioritize APs, no matter which AP is hidden or underestimated at risks [5]. Barrère et al built AND/OR dependency graphs to identify a minimal number of the ICS components with overlapping security measures or critical missions [12,13]. Considering the cost of remediations and security budgets for securing the IoT, Yiğit et al leveraged a compact AG to construct a cost-effective protecting strategy applied to the large-scale environment [14].…”
Section: Related Workmentioning
confidence: 99%
“…Stellios et al modeled both the cyber connectivity and physical interactions to prioritize APs, no matter which AP is hidden or underestimated at risks [5]. Barrère et al built AND/OR dependency graphs to identify a minimal number of the ICS components with overlapping security measures or critical missions [12,13]. Considering the cost of remediations and security budgets for securing the IoT, Yiğit et al leveraged a compact AG to construct a cost-effective protecting strategy applied to the large-scale environment [14].…”
Section: Related Workmentioning
confidence: 99%
“…The AND branch means all parents need to be satisfied, while the OR branch requires just one to be fulfilled. Research has delved into the integration of AND/OR graphs into the realm of cybersecurity [11], as well as their application in game theory [93]. CPAG are the class of attack graphs that effectively encompasses both cyber and physical aspects of an attacker attempting to breach a network's security [85].…”
Section: Cyber-physical Attack Graphsmentioning
confidence: 99%