2017
DOI: 10.3103/s0146411617080272
|View full text |Cite
|
Sign up to set email alerts
|

Systematization and security assessment of cyber-physical systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 26 publications
(8 citation statements)
references
References 8 publications
0
8
0
Order By: Relevance
“…Hardware Domain attacks were mostly categorized as Malicious Logic Insertion and Shared Resource Manipulation. Examples are attacks such as hardware trojans [14][16] [37], data manipulation in memory [16] and infected memory [8], extraction attacks from Direct Memory Access (DMA), peripheral address manipulation [17], and power system disruption [18]. Manipulation During Manufacture and Manipulation During Distribution were notable attack vectors within the Supply Chain Domain.…”
Section: B Attack Vectorsmentioning
confidence: 99%
“…Hardware Domain attacks were mostly categorized as Malicious Logic Insertion and Shared Resource Manipulation. Examples are attacks such as hardware trojans [14][16] [37], data manipulation in memory [16] and infected memory [8], extraction attacks from Direct Memory Access (DMA), peripheral address manipulation [17], and power system disruption [18]. Manipulation During Manufacture and Manipulation During Distribution were notable attack vectors within the Supply Chain Domain.…”
Section: B Attack Vectorsmentioning
confidence: 99%
“…Sustainability of a cyber-physical system may be identified by assessing the capability of the system to stay in a stable state [2], and such assessment must be carried out for the entire system, not just for its separate elements. In this case, cyber-physical system sustainability indices are applied as set forth in [12]. Self-similarity of a system is determined using the fractal method based on the Hurst coefficient (1) and the Fano factor (2).…”
Section: Self-similarity As a Criterion Of Digital Manufacturing Sustmentioning
confidence: 99%
“…Homeostatic control is a bio-inspired concept of managing intelligent technical systems and consists of provision of a relational balance of the system maintained by self-regulation mechanisms. Homeostasis implies a combination of mechanisms which ensure constancy of the system's internal environment and its structural and functional resilience to external destructive actions [12].…”
Section: Concept Of Homeostatic Control and Self-similarity Assessmenmentioning
confidence: 99%
See 2 more Smart Citations