Security of Cyber-Physical Systems
CyberICPS, ESORICS 2016, September 27, 2016
Joaquin Garcia-Alfaro
CNRS SAMOVAR Lab & Télécom SudParis Université Paris-Saclay
Security of Cyber-Physical Systems From Theory to Testbeds & - - PowerPoint PPT Presentation
Security of Cyber-Physical Systems From Theory to Testbeds & Validation Joaquin Garcia-Alfaro CNRS SAMOVAR Lab & Tlcom SudParis Universit Paris-Saclay CyberICPS, ESORICS 2016, September 27, 2016 Context Dynamic Risk Approaches
CNRS SAMOVAR Lab & Télécom SudParis Université Paris-Saclay
2
http://www.panoptesec.eu/
3
http://www.panoptesec.eu/
4
5
6
monitoring devices to retrieve measurements related to specific physical phenomena
managing some external devices
7
to control those devices monitoring/controlling end- points, often deployed far away from the backend
8
collection of data, data storage, and control of sensors and actuators via the RTUs/PLCs
9
Priority IT Systems #1 Confidentiality #2 Integrity #3 Availability MTUs to I/O Availability Integrity Confidentiality
* HIRSCHMANN, Why is Cyber Security Still a Problem? TOFINO Security Series
10
11
12
13
14
15
16
17
18
19
20
21
Source: Hacking Chemical Plants for Competition and Extortion, Krotofil and Larsen, DefCon23, 2015.
22
measurements related to specific physical phenomena
managing some external devices
23
to control a myriad (thousand to million) of devices monitoring/controlling end-points, often deployed far away (hundreds to thousands of km) from the backend
24
25
26
27
* Cyber–Physical Systems: A Perspective at the Centennial. Kim and Kumar. Proceedings of the IEEE,
28
29
30
31
32
Controller
Networked Control System (NCS) u
Network
y
People & Control Loops Information and Communications Technologies (ICT)
System
Sensors & Actuators Management Systems Programmable Automata
33
(Integrity, Availability) (Dynamics of the System) * A secure control framework for resource-limited adversaries. Texeira et al., Automatica, 51(1):135-148, 2015.
34
35
(Integrity, Availability) (Secrecy) (Dynamics of the System) * A secure control framework for resource-limited adversaries. Texeira et al., Automatica, 51(1):135-148, 2015.
36
* A survey on the security of cyber-physical systems. Wu, Sun, and Chen. Control Theory and Technology, 14(1):2–10, February 2016.
37
* 11th International Conference on Availability, Reliability and Security (ARES 2016), August 2016. (Best Paper Runner-Up Award)
39
* Physical Authentication of Control Systems. Mo, Weerakkody and Sinopoli. IEEE Control Systems, Vol. 35, pages 93–109, 2015.
40
* Physical Authentication of Control Systems. Mo, Weerakkody and Sinopoli. IEEE Control Systems, Vol. 35, pages 93–109, 2015.
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
IEEE, Vol. 100, pages 1287-1308, May 2012.
51(1):135-148, 2015.
Technology, 14(1):2–10, February 2016.
Cyber-Physical Attacks. ARES 2016, (Best Paper Runner-Up Award), August 2016.