Cyber-Physical Resilient Systems
ETIC-UPF Seminars, Barcelona, 01/03/2018
Joaquin Garcia-Alfaro
Institut Mines-Télécom (Télécom SudParis) & Université Paris-Saclay
Cyber-Physical Resilient Systems From Malware & Operational - - PowerPoint PPT Presentation
Cyber-Physical Resilient Systems From Malware & Operational Security to Feedback Truthfulness Distinguishability Joaquin Garcia-Alfaro Institut Mines-Tlcom (Tlcom SudParis) & Universit Paris-Saclay ETIC-UPF Seminars,
Institut Mines-Télécom (Télécom SudParis) & Université Paris-Saclay
* H. Gill, National Science Foundation, 2006.
2
3
4
5
6
7
Priority IT Systems #1 Confidentiality #2 Integrity #3 Availability MTUs to I/O Availability Integrity Confidentiality
[1] HIRSCHMANN, Why is Cyber Security Still a Problem? TOFINO Security Series
8
9
10
11
12
13
(Integrity, Availability) (Dynamics of the System) * A secure control framework for resource-limited adversaries. Texeira et al., Automatica, 51(1):135-148, 2015.
14
15
* A survey on the security of cyber-physical systems. Wu, Sun, and Chen. Control Theory and Technology, 14(1):2–10, February 2016.
16
* Physical Authentication of Control Systems. Mo, Weerakkody and Sinopoli. IEEE Control Systems, Vol. 35, pages 93–109, 2015.
17
time invariant models)
normal behavior w.r.t. system dynamics)
[*] Garcia-Alfaro et al., « Cyber-Physical Attacks & Watermark-based Detection », 11th Intl. ARES
Conference, Best Paper Award, Aug 2016 ; & Keynote ESORICS 2016 workshops, Sep 2016
18
19
20
Sample protocols
extensible
21
22
23
24
25
Adversary Controllers
2 1 1 2
Network, system, sensors & actuators Adversary
σ ≤ v1 ≤ ω x2-x1 > τ x2-x1 ≤ τ σ ≤ v2 ≤ ω x2-x1 > τ 0 ≤ v1 < σ σ < v2 ≤ ω x2-x1 ≤ τ x2-x1 > τ
29
30
31
IEEE, Vol. 100, pages 1287-1308, May 2012.
135-148, 2015.
Technology, 14(1):2–10, February 2016.
Cyber-Physical Attacks. ARES 2016, (best paper award), August 2016.