2015
DOI: 10.1007/978-3-662-45928-7_12
|View full text |Cite
|
Sign up to set email alerts
|

Intrusion Detection for CPS Real-Time Controllers

Abstract: Security in CPS-based real-time embedded systems controlling the power grid has been an afterthought, but it is becoming a critical issue as CPS systems are networked and inter-dependent. This work presents a set of mechanisms for time-based intrusion detection, i.e., the execution of unauthorized instructions in real-time CPS environments. The novelty is the utilization of information obtained by static timing analysis for intrusion detection. Real-time CPS systems are unique in that timing bounds on code sec… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(2 citation statements)
references
References 39 publications
0
2
0
Order By: Relevance
“…However, as mentioned previously, this extreme solution may not be suitable for hard-real-time systems, as it may cause the system to enter an unstable state. Zimmer et al [24] use the WCET timing bound to detect code injection attacks by comparing the WCET value with the elapsed time along the return path. Petal et al [14] proposed an approach to monitor the execution time of the running tasks.…”
Section: Time-based Intrusion Detection Approachmentioning
confidence: 99%
“…However, as mentioned previously, this extreme solution may not be suitable for hard-real-time systems, as it may cause the system to enter an unstable state. Zimmer et al [24] use the WCET timing bound to detect code injection attacks by comparing the WCET value with the elapsed time along the return path. Petal et al [14] proposed an approach to monitor the execution time of the running tasks.…”
Section: Time-based Intrusion Detection Approachmentioning
confidence: 99%
“…Zimmer et al [22] proposed time-based IDS using timing metrics and comparing the worst-case bounds to detect code injection on CPS system. The three approaches in the study are to obtain timing bound during static analysis, synchronous scheduler calls, asynchronous scheduler calls.…”
Section: Evaluation Of Idss In Cpsmentioning
confidence: 99%