2016
DOI: 10.1007/978-3-319-47846-3_12
|View full text |Cite
|
Sign up to set email alerts
|

CPDY: Extending the Dolev-Yao Attacker with Physical-Layer Interactions

Abstract: We propose extensions to the Dolev-Yao attacker model to make it suitable for arguments about security of Cyber-Physical Systems. The Dolev-Yao attacker model uses a set of rules to define potential actions by an attacker with respect to messages (i.e. information) exchanged between parties during a protocol execution. As the traditional Dolev-Yao model considers only information (exchanged over a channel controlled by the attacker), the model cannot directly be used to argue about the security of cyber-physic… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
21
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
6
1

Relationship

1
6

Authors

Journals

citations
Cited by 28 publications
(21 citation statements)
references
References 34 publications
0
21
0
Order By: Relevance
“…Rocchetto and Tippenhaur [32] introduced a taxonomy of the diverse attacker models proposed for CPS security and outline requirements for generalised attacker models; in [31], they then proposed an extended Dolev-Yao attacker model suitable for CPSs. In their approach, physical layer interactions are modelled as abstract interactions between logical components to support reasoning on the physical-layer security of CPSs.…”
Section: Conclusion Related and Future Workmentioning
confidence: 99%
“…Rocchetto and Tippenhaur [32] introduced a taxonomy of the diverse attacker models proposed for CPS security and outline requirements for generalised attacker models; in [31], they then proposed an extended Dolev-Yao attacker model suitable for CPSs. In their approach, physical layer interactions are modelled as abstract interactions between logical components to support reasoning on the physical-layer security of CPSs.…”
Section: Conclusion Related and Future Workmentioning
confidence: 99%
“…Using cryptographic protocol verification tools such as CL-Atse allows to not require to model the attacker which is hardcoded in the tool making the Dolev-Yao attacker difficult to restrict. In their work, Rocchetto and Tippenhauer strengthen it by adding equational theories (allowing to handle physical interactions with the process [15]). We aim to focus on attackers resulting of a risk analysis which are often less powerful than Dolev-Yao.…”
Section: Comparing To State-of-the-artmentioning
confidence: 99%
“…In 2017, Rocchetto and Tippenhauer [13] present a method based on the cryptographic protocol verification tool CL-Atse [14]. They use the ASLAN++ language to model the industrial system and its applicative logic alongside with an augmented Dolev-Yao intruder, able to physically interact with the process [15].…”
Section: Introductionmentioning
confidence: 99%
“…Description of the Case Study. Similarly to [9,5] we consider a CPS (depicted in Figure 2) composed by five agents: -A tank containing water.…”
Section: Cyber-physical Systemsmentioning
confidence: 99%