2016 IEEE 55th Conference on Decision and Control (CDC) 2016
DOI: 10.1109/cdc.2016.7799047
|View full text |Cite
|
Sign up to set email alerts
|

When adversary encounters uncertain cyber-physical systems: Robust zero-dynamics attack with disclosure resources

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
30
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
7
1
1

Relationship

2
7

Authors

Journals

citations
Cited by 46 publications
(30 citation statements)
references
References 13 publications
0
30
0
Order By: Relevance
“…So long as the dynamics of x is concerned, adding and subtracting the function (15) to the control u defined in (17), one obtains…”
Section: Proof Of the Main Result: A Change Of Coordinatesmentioning
confidence: 99%
See 1 more Smart Citation
“…So long as the dynamics of x is concerned, adding and subtracting the function (15) to the control u defined in (17), one obtains…”
Section: Proof Of the Main Result: A Change Of Coordinatesmentioning
confidence: 99%
“…In fact, as shown e.g. in [17], in a system whose zero dynamics are unstable, with an (output feedback) control chosen so as to guarantee asymptotic stability in the absence of attacks, an attack generator may inject signals that make the internal state diverge, while the effects of such attack are not visible from the mere observation of the output (on the measure of which the stabilizing control is designed). An attack of this kind is commonly referred to as a zero-dynamics attack.…”
Section: Introductionmentioning
confidence: 99%
“…Proposition 1: [34] Under the stealthy attack policy consisting of (16) and (17), the states and monitored outputs of the systems (9) and (7) in the presence of attack signal (15) satisfy…”
Section: B Naive Attackermentioning
confidence: 99%
“…We will show that all of these can be done with the input redundancy. It should be pointed out that, unlike the wellknown zero-dynamics attack [7], [10], [11], the proposed attack policy is applicable even when there is no unstable Fig. 1: Sampled-data system connected through network zero (either for continuous-time model or for its sampled-data counterpart).…”
Section: Introductionmentioning
confidence: 99%