SLIDE 22 Related work
Optimization Based Techniques
. Tabuada, and S. Diggavi, “Secure estimation and control for cyber-physical systems under adversarial attacks,” TAC, 2014.
- M. Pajic, J. Weimer, N. Bezzo, P
. Tabuada, O. Sokolsky,
- I. Lee, and G. Pappas, “Robustness of attack-resilient
state estimators,” ICCPS, 2014.
- Y. Mo and R. Murray, “Multi-dimensional state estimation
in adversarial environment,” CCC 2015.
- F. Pasqualetti, F. Dorfler, and F. Bullo, “Attack detection
and identification in cyber-physical systems,” TAC, 2013.
. Tabuada, “Event-Triggered State Observers for Sparse Sensor Noise/Attacks,” ArXiv, 2013.
Because of the combinatorial nature
- f secure state estimation, the
resulting problem is non-convex. Option 1: Solve via brute force. Scales poorly with number of sensors. Option 2: Relax the problem. Results in unsound algorithms. Satisfiability Based Techniques
- M. Rahman, E. Al-Saher, R.G. Kavasseri, “A formal
model for verifying the impact of stealthy attacks on
- ptimal power flow in power grid,” ICCPS, 2014.
Use a Satisfiability Modulo Theory (SMT) solver (e.g. Z3, UCLID, ..). SMT solvers handle combinatorial problems more favorably. But, SMT solvers do not handle real-valued variables well.
Yasser Shoukry IMHOTEP-SMT - SMT Workshop’15 July 19, 2015 8 / 30