Proceedings of the 6th ACM on Cyber-Physical System Security Workshop 2020
DOI: 10.1145/3384941.3409589
|View full text |Cite
|
Sign up to set email alerts
|

Towards Systematically Deriving Defence Mechanisms from Functional Requirements of Cyber-Physical Systems

Abstract: The threats faced by cyber-physical systems (CPSs) in critical infrastructure have motivated the development of different attack detection mechanisms, such as those that monitor for violations of invariants, i.e. properties that always hold in normal operation. Given the complexity of CPSs, several existing approaches focus on deriving invariants automatically from data logs, but these can miss possible system behaviours if they are not represented in that data. Furthermore, resolving any design flaws identifi… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2021
2021
2021
2021

Publication Types

Select...
1
1

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 36 publications
0
1
0
Order By: Relevance
“…Cyber-physical systems (CPSs), in which software components are deeply intertwined with physical processes, are ubiquitous in critical public infrastructure. The potential disruption that could result from a compromised system has motivated research into a multitude of CPS attack detection mechanisms, including techniques based on invariant checking [1,2,3,4], attestation [5,6,7], and fingerprinting [8,9]. A particularly popular solution is to build anomaly detectors [10,11,12,13,14,15,16], in which an underlying machine learning (ML) model is trained on a time series of the system's physical data in order to judge when future values are deviating from the norm.…”
Section: Introductionmentioning
confidence: 99%
“…Cyber-physical systems (CPSs), in which software components are deeply intertwined with physical processes, are ubiquitous in critical public infrastructure. The potential disruption that could result from a compromised system has motivated research into a multitude of CPS attack detection mechanisms, including techniques based on invariant checking [1,2,3,4], attestation [5,6,7], and fingerprinting [8,9]. A particularly popular solution is to build anomaly detectors [10,11,12,13,14,15,16], in which an underlying machine learning (ML) model is trained on a time series of the system's physical data in order to judge when future values are deviating from the norm.…”
Section: Introductionmentioning
confidence: 99%