Biblio

Filters: Author is Lee, Insup  [Clear All Filters]
2018-09-12
Park, Sangdon, Weimer, James, Lee, Insup.  2017.  Resilient Linear Classification: An Approach to Deal with Attacks on Training Data. Proceedings of the 8th International Conference on Cyber-Physical Systems. :155–164.
Data-driven techniques are used in cyber-physical systems (CPS) for controlling autonomous vehicles, handling demand responses for energy management, and modeling human physiology for medical devices. These data-driven techniques extract models from training data, where their performance is often analyzed with respect to random errors in the training data. However, if the training data is maliciously altered by attackers, the effect of these attacks on the learning algorithms underpinning data-driven CPS have yet to be considered. In this paper, we analyze the resilience of classification algorithms to training data attacks. Specifically, a generic metric is proposed that is tailored to measure resilience of classification algorithms with respect to worst-case tampering of the training data. Using the metric, we show that traditional linear classification algorithms are resilient under restricted conditions. To overcome these limitations, we propose a linear classification algorithm with a majority constraint and prove that it is strictly more resilient than the traditional algorithms. Evaluations on both synthetic data and a real-world retrospective arrhythmia medical case-study show that the traditional algorithms are vulnerable to tampered training data, whereas the proposed algorithm is more resilient (as measured by worst-case tampering).
Park, Junkil, Ivanov, Radoslav, Weimer, James, Pajic, Miroslav, Son, Sang Hyuk, Lee, Insup.  2017.  Security of Cyber-Physical Systems in the Presence of Transient Sensor Faults. ACM Trans. Cyber-Phys. Syst.. 1:15:1–15:23.
This article is concerned with the security of modern Cyber-Physical Systems in the presence of transient sensor faults. We consider a system with multiple sensors measuring the same physical variable, where each sensor provides an interval with all possible values of the true state. We note that some sensors might output faulty readings and others may be controlled by a malicious attacker. Differing from previous works, in this article, we aim to distinguish between faults and attacks and develop an attack detection algorithm for the latter only. To do this, we note that there are two kinds of faults—transient and permanent; the former are benign and short-lived, whereas the latter may have dangerous consequences on system performance. We argue that sensors have an underlying transient fault model that quantifies the amount of time in which transient faults can occur. In addition, we provide a framework for developing such a model if it is not provided by manufacturers. Attacks can manifest as either transient or permanent faults depending on the attacker’s goal. We provide different techniques for handling each kind. For the former, we analyze the worst-case performance of sensor fusion over time given each sensor’s transient fault model and develop a filtered fusion interval that is guaranteed to contain the true value and is bounded in size. To deal with attacks that do not comply with sensors’ transient fault models, we propose a sound attack detection algorithm based on pairwise inconsistencies between sensor measurements. Finally, we provide a real-data case study on an unmanned ground vehicle to evaluate the various aspects of this article.
2018-05-16
Park, Junkil, Pajic, Miroslav, Sokolsky, Oleg, Lee, Insup.  2017.  Automatic Verification of Finite Precision Implementations of Linear Controllers. Tools and Algorithms for the Construction and Analysis of Systems: 23rd International Conference, TACAS 2017, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2017, Uppsala, Sweden, April 22-29, 2017, Proceedings, P. :153–169.
Ivanov, Radoslav, Pajic, Miroslav, Lee, Insup.  2016.  Attack-Resilient Sensor Fusion for Safety-Critical Cyber-Physical Systems. ACM Transactions on Embedded Computing Systems. 15:21:1–21:24.
2017-05-19
Ivanov, Radoslav, Pajic, Miroslav, Lee, Insup.  2016.  Attack-Resilient Sensor Fusion for Safety-Critical Cyber-Physical Systems. ACM Trans. Embed. Comput. Syst.. 15:21:1–21:24.

This article focuses on the design of safe and attack-resilient Cyber-Physical Systems (CPS) equipped with multiple sensors measuring the same physical variable. A malicious attacker may be able to disrupt system performance through compromising a subset of these sensors. Consequently, we develop a precise and resilient sensor fusion algorithm that combines the data received from all sensors by taking into account their specified precisions. In particular, we note that in the presence of a shared bus, in which messages are broadcast to all nodes in the network, the attacker’s impact depends on what sensors he has seen before sending the corrupted measurements. Therefore, we explore the effects of communication schedules on the performance of sensor fusion and provide theoretical and experimental results advocating for the use of the Ascending schedule, which orders sensor transmissions according to their precision starting from the most precise. In addition, to improve the accuracy of the sensor fusion algorithm, we consider the dynamics of the system in order to incorporate past measurements at the current time. Possible ways of mapping sensor measurement history are investigated in the article and are compared in terms of the confidence in the final output of the sensor fusion. We show that the precision of the algorithm using history is never worse than the no-history one, while the benefits may be significant. Furthermore, we utilize the complementary properties of the two methods and show that their combination results in a more precise and resilient algorithm. Finally, we validate our approach in simulation and experiments on a real unmanned ground robot.

2018-05-16
Park, Junkil, Pajic, Miroslav, Lee, Insup, Sokolsky, Oleg.  2016.  Scalable Verification of Linear Controller Software. Tools and Algorithms for the Construction and Analysis of Systems (TACAS). :662–679.
Pajic, Miroslav, Park, Junkil, Lee, Insup, Pappas, George J., Sokolsky, Oleg.  2015.  Automatic Verification of Linear Controller Software. Proceedings of the 12th International Conference on Embedded Software. :217–226.
2018-05-23
2018-05-16
Park, Junkil, Ivanov, Radoslav, Weimer, James, Pajic, Miroslav, Lee, Insup.  2015.  Sensor Attack Detection in the Presence of Transient Faults. Proceedings of the ACM/IEEE Sixth International Conference on Cyber-Physical Systems. :1–10.
2018-05-23
Kohl, Benjamin A., Chen, Sanjian, Mullen-Fortino, Margaret, Lee, Insup.  2013.  Evaluation and Enhancement of an Intraoperative Insulin Infusion Protocol via In-Silico Simulation. Proceedings of the 2013 IEEE International Conference on Healthcare Informatics (ICHI '13). :307–316.
King, Andrew L, Feng, Lu, Sokolsky, Oleg, Lee, Insup.  2013.  A modal specification approach for on-demand medical systems. Foundations of Health Information Engineering and Systems. :199–216.
Wang, Shaohui, Ayoub, Anaheed, Sokolsky, Oleg, Lee, Insup.  2012.  Runtime Verification of Traces Under Recording Uncertainty. Proceedings of the Second International Conference on Runtime Verification (RV'11). :442–456.
King, Andrew, Fortino, Kelsea, Stevens, Nicholas, Shah, Sachin, Fortino-Mullen, Margaret, Lee, Insup.  2012.  Evaluation of a smart alarm for intensive care using clinical data. 34$^{th}$ Annual International Conference of the IEEE Engineering in Medicine and Biology Society.. :166–169.
Arney, David, Venkatasubramanian, Krishna K, Sokolsky, Oleg, Lee, Insup.  2011.  Biomedical devices and systems security. 2011 Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC). :2376–2379.