2021
DOI: 10.1109/tdsc.2019.2906161
|View full text |Cite
|
Sign up to set email alerts
|

Checking is Believing: Event-Aware Program Anomaly Detection in Cyber-Physical Systems

Abstract: Securing cyber-physical systems (CPS) against malicious attacks is of paramount importance because these attacks may cause irreparable damages to physical systems. Recent studies have revealed that control programs running on CPS devices suffer from both control-oriented attacks (e.g., code-injection or code-reuse attacks) and data-oriented attacks (e.g., non-control data attacks). Unfortunately, existing detection mechanisms are insufficient to detect runtime data-oriented exploits, due to the lack of runtime… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 24 publications
(5 citation statements)
references
References 59 publications
(98 reference statements)
0
5
0
Order By: Relevance
“…is technique is helpful in detection of exterior attack in MASs. Attacks were supposed as unidentified inputs which effects both of states and measurements [110][111][112][113]. Using graph theory, undetectable attacks were characterized and also with the use of distributed and centralized monitor have been planned for the detection of distinguishing attacks.…”
Section: Quasi Fault Detection and Isolation Techniques (Fdi)mentioning
confidence: 99%
“…is technique is helpful in detection of exterior attack in MASs. Attacks were supposed as unidentified inputs which effects both of states and measurements [110][111][112][113]. Using graph theory, undetectable attacks were characterized and also with the use of distributed and centralized monitor have been planned for the detection of distinguishing attacks.…”
Section: Quasi Fault Detection and Isolation Techniques (Fdi)mentioning
confidence: 99%
“…Challenge I: How to validate configurations effectively? Approaches proposed for analyzing flight control programs are generally based on static program analysis techniques that explore control and data dependencies [11,19,26]. However, such techniques are not suitable for validating configuration because large numbers of specified parameter values need to be analyzed.…”
Section: Challengesmentioning
confidence: 99%
“…When the system is attacked, some data or instructions are identified by the detection algorithm as not conforming to the normal state or execution semantics, thus identifying the system is under attack. [26] proposes a general method to reason about the semantics of cyber‐physical execution of control programs, that is, the causal dependencies between physical context or events and program control flow. Subtle data‐oriented DoS attack can be detected when physical events are inconsistent with the corresponding state transitions of dependent events.…”
Section: Introductionmentioning
confidence: 99%