Visible to the public Safety-critical Cyber-physical Attacks: Analysis, Detection, and MitigationConflict Detection Enabled

TitleSafety-critical Cyber-physical Attacks: Analysis, Detection, and Mitigation
Publication TypeConference Paper
Year of Publication2016
AuthorsHui Lin, University of Illinois at Urbana-Champaign, Homa Alemzadeh, IBM TJ Watson, Daniel Chen, University of Illinois at Urbana-Champagin, Zbigniew Kalbarczyk, University of Illinois at Urbana-Champaign, Ravishankar K. Iyer, University of Illinois at Urbana-Champaign
Conference NameSymposium and Bootcamp for the Science of Security (HotSoS 2016)
Date Published04/2016
PublisherACM
Conference LocationPittsburgh, PA
KeywordsCPS Domains, Data Driven Security Models and Analysis, energy, Health Care, Intrusion/Anomaly Detection and Malware Mitigation, Medical Devices, NSA SoS Lablets Materials, science of security, Smart grid, UIUC
Abstract

Today's cyber-physical systems (CPSs) can have very different characteristics in terms of control algorithms, configurations, underlying infrastructure, communication protocols, and real-time requirements. Despite these variations, they all face the threat of malicious attacks that exploit the vulnerabilities in the cyber domain as footholds to introduce safety violations in the physical processes. In this paper, we focus on a class of attacks that impact the physical processes without introducing anomalies in the cyber domain. We present the common challenges in detecting this type of attacks in the contexts of two very different CPSs (i.e., power grids and surgical robots). In addition, we present a general principle for detecting such cyber-physical attacks, which combine the knowledge of both cyber and physical domains to estimate the adverse consequences of malicious activities in a timely manner.

URLhttp://publish.illinois.edu/science-of-security-lablet/files/2014/05/Safety-Critical-Cyber-Physical-...
Citation Keynode-29819

Other available formats:

Safety-Critical Cyber-Physical Attacks Analysis Detection and Mitigation
AttachmentSize
bytes