Biblio

Filters: Author is Sinopoli, Bruno  [Clear All Filters]
2018-05-17
Weerakkody, Sean, Ozel, Omur, Griffioen, Paul, Sinopoli, Bruno.  Submitted.  Active Detection for Exposing Intelligent Attacks in Control Systems. 1st IEEE Conference on Control Technology and Applications.
2021-12-20
Griffioen, Paul, Romagnoli, Raffaele, Krogh, Bruce H., Sinopoli, Bruno.  2021.  Resilient Control in the Presence of Man-in-the-Middle Attacks. 2021 American Control Conference (ACC). :4553–4560.
Cyber-physical systems, which are ubiquitous in modern critical infrastructure, oftentimes rely on sending actuation commands and sensor measurements over a network, subjecting this information to potential man-in-the-middle attacks. These attacks can take the form of denial of service attacks or integrity attacks. Previous approaches at ensuring the resiliency of the overall control system against these types of attacks have leveraged functional redundancy in the system, including resilient estimation and reconfigurable control. However, these approaches are only able to ensure resiliency up to a particular subset of the actuator commands and sensor measurements being compromised. In contrast, we introduce a resiliency mechanism in this paper that can ensure safety for the overall system when all the actuator commands and sensor measurements are compromised. In addition, this approach does not require the implementation of any detection algorithm. We leverage communication redundancy in the number of pathways across the network to guarantee safety when up to a certain percentage of those pathways are compromised. The conditions under which safety is guaranteed are presented along with the resiliency mechanism itself, and our results are illustrated via simulation.
2020-03-27
Romagnoli, Raffaele, Krogh, Bruce H., Sinopoli, Bruno.  2019.  Design of Software Rejuvenation for CPS Security Using Invariant Sets. 2019 American Control Conference (ACC). :3740–3745.

Software rejuvenation has been proposed as a strategy to protect cyber-physical systems (CSPs) against unanticipated and undetectable cyber attacks. The basic idea is to refresh the system periodically with a secure and trusted copy of the online software so as to eliminate all effects of malicious modifications to the run-time code and data. This paper considers software rejuvenation design from a control-theoretic perspective. Invariant sets for the Lyapunov function for the safety controller are used to derive bounds on the time that the CPS can operate in mission control mode before the software must be refreshed. With these results it can be guaranteed that the CPS will remain safe under cyber attacks against the run-time system. The approach is illustrated using simulation of the nonlinear dynamics of a quadrotor system. The concluding section discusses directions for further research.

2020-02-18
Griffioen, Paul, Weerakkody, Sean, Sinopoli, Bruno.  2019.  An Optimal Design of a Moving Target Defense for Attack Detection in Control Systems. 2019 American Control Conference (ACC). :4527–4534.
In this paper, we consider the problem of designing system parameters to improve detection of attacks in control systems. Specifically, we study control systems which are vulnerable to integrity attacks on sensors and actuators. We aim to defend against strong model aware adversaries that can read and modify all sensors and actuators. Previous work has proposed a moving target defense for detecting integrity attacks on control systems. Here, an authenticating subsystem with time-varying dynamics coupled to the original plant is introduced. Due to this coupling, an attack on the original system will affect the authenticating subsystem and in turn be revealed by a set of sensors measuring the extended plant. Moreover, the time-varying dynamics of the extended plant act as a moving target, preventing an adversary from developing an effective adaptive attack strategy. Previous work has failed to consider the design of the time-varying system matrices and as such provides little in terms of guidelines for implementation in real systems. This paper proposes two optimization problems for designing these matrices. The first designs the auxiliary actuators to maximize detection performance while the second designs the coupling matrices to maximize system estimation performance. Numerical examples are presented that validate our approach.
2018-05-17
Weerakkody, Sean, Ozel, Omur, Sinopoli, Bruno.  2017.  A Bernoulli-Gaussian Physical Watermark for Detecting Integrity Attacks in Control Systems. 55th Annual Allerton Conference on Communication, Control, and Computing.
Ozel, Omur, Weerakkody, Sean, Sinopoli, Bruno.  2017.  Physical Watermarking for Securing Cyber Physical Systems via Packet Drop Injections. 8th IEEE International Conference on Smart Grid Communications.
Weerakkody, Sean, Sinopoli, Bruno, Kar, Soummya, Datta, Anupam.  2016.  Information Flow for Security in Control Systems. 55th IEEE Conference on Decision and Control (CDC). :5065-5072.
Weerakkody, Sean, Sinopoli, Bruno.  2016.  A moving target approach for identifying malicious sensors in control systems. 54th Annual Allerton Conference on Communication, Control, and Computing. :1149–1156.