2018 IEEE Symposium on Security and Privacy (SP) 2018
DOI: 10.1109/sp.2018.00016
|View full text |Cite
|
Sign up to set email alerts
|

Learning from Mutants: Using Code Mutation to Learn and Monitor Invariants of a Cyber-Physical System

Abstract: Cyber-physical systems (CPS) consist of sensors, actuators, and controllers all communicating over a network; if any subset becomes compromised, an attacker could cause significant damage. With access to data logs and a model of the CPS, the physical effects of an attack could potentially be detected before any damage is done. Manually building a model that is accurate enough in practice, however, is extremely difficult. In this paper, we propose a novel approach for constructing models of CPS automatically, b… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
101
0

Year Published

2018
2018
2020
2020

Publication Types

Select...
4
2
2

Relationship

1
7

Authors

Journals

citations
Cited by 113 publications
(101 citation statements)
references
References 44 publications
0
101
0
Order By: Relevance
“…For example, Momtazpour et al [49] conduct anomaly detection by using an ARX (Auto Regression with eXogenous input) model with pre-discovered latent variables to find invariants between wireless sensor data within multiple time steps at Intel Berkeley Research lab. Chen et al [50] use code mutation programs to generate abnormal data traces, and then use a SVM classifier and statistical model checking to find invariants between sensor data in the SWaT testbed. Nevertheless, the invariant rules generated in our work are more comprehensive than [49], [50] as actuator states which are an important part of the control dynamics in ICS are also included.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…For example, Momtazpour et al [49] conduct anomaly detection by using an ARX (Auto Regression with eXogenous input) model with pre-discovered latent variables to find invariants between wireless sensor data within multiple time steps at Intel Berkeley Research lab. Chen et al [50] use code mutation programs to generate abnormal data traces, and then use a SVM classifier and statistical model checking to find invariants between sensor data in the SWaT testbed. Nevertheless, the invariant rules generated in our work are more comprehensive than [49], [50] as actuator states which are an important part of the control dynamics in ICS are also included.…”
Section: Related Workmentioning
confidence: 99%
“…Chen et al [50] use code mutation programs to generate abnormal data traces, and then use a SVM classifier and statistical model checking to find invariants between sensor data in the SWaT testbed. Nevertheless, the invariant rules generated in our work are more comprehensive than [49], [50] as actuator states which are an important part of the control dynamics in ICS are also included.…”
Section: Related Workmentioning
confidence: 99%
“…Other researches focused on the detection of anomalies with physical properties [14]. By using the specification or control logic, the monitoring system rarely emits false alarms [3,15]. However, it is relatively expensive to obtain and specify the specification or control logic.…”
Section: Introductionmentioning
confidence: 99%
“…In this work, however, they utilize stimulant-response mechanisms to detect compromised devices based on their speci c reaction to controlled inputs, which can also be impractical for the smart grid and results can depend on several undesired networks' and physical channels' dynamics. Other relevant works propose similar a estation approaches [14,55] to detect a acks in CPS. However, these works focus on building models of the entire CPS network instead of focusing on individual devices, which impacts the overhead and the general performance of the proposed solutions.…”
Section: Related Workmentioning
confidence: 99%