2021
DOI: 10.1016/j.jss.2020.110746
|View full text |Cite
|
Sign up to set email alerts
|

Security modelling and formal verification of survivability properties: Application to cyber–physical systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
18
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 22 publications
(18 citation statements)
references
References 57 publications
0
18
0
Order By: Relevance
“…Formal methods are mostly used to verify whether a software/hardware system meets certain requirements, 35 and have been widely adopted in various domains 36–41 . Wang et al 41 applied a formal method to verify the output bound of DNNs.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Formal methods are mostly used to verify whether a software/hardware system meets certain requirements, 35 and have been widely adopted in various domains 36–41 . Wang et al 41 applied a formal method to verify the output bound of DNNs.…”
Section: Related Workmentioning
confidence: 99%
“…Koley et al 38 proposed a formal approach for attack detectors in CPS. Formal methods are also used to verify the survivability properties in CPS 36 . We first use the formal method to verify the effectiveness of incentive mechanism in the proposed framework.…”
Section: Related Workmentioning
confidence: 99%
“…In further research, Semerci et al [18] introduce an intelligentbased system for detecting an attack; however, it only focusses on specific types of attacks: Distributed Denial of Services (DDOS). Different points of view in defending a system are provided in [19][20]. This research explains how the attack occurs, which illustrates a defending model.…”
Section: Related Workmentioning
confidence: 99%
“…Besides guaranteeing the correctness of the system behavior, there exist important challenges, such as performance, reliability, and security, which must be tackled, especially in an industrial context. For instance, trustworthiness, intended as the capacity of CPS to deal with disruption while guaranteeing a temporary impact on provided services, has been recently outlined in the literature as one of the major challenges [8], [9], mainly due to these difficulties: (i) failures can occur in various unexpected ways due to uncertainties in the operational environment; (ii) adversarial threats (e.g., the opportunistic behavior of agents [10]) are likely to take place in practice [11], and it is not trivial to plan which countermeasures need to be applied for system recovery.…”
Section: Introductionmentioning
confidence: 99%