A survey of physics-based attack detection in cyber-physical systems

J Giraldo, D Urbina, A Cardenas, J Valente… - ACM Computing …, 2018 - dl.acm.org
Monitoring the “physics” of cyber-physical systems to detect attacks is a growing area of
research. In its basic form, a security monitor creates time-series models of sensor readings …

Limiting the impact of stealthy attacks on industrial control systems

DI Urbina, JA Giraldo, AA Cardenas… - Proceedings of the …, 2016 - dl.acm.org
While attacks on information systems have for most practical purposes binary outcomes
(information was manipulated/eavesdropped, or not), attacks manipulating the sensor or …

Worst-case stealthy innovation-based linear attack on remote state estimation

Z Guo, D Shi, KH Johansson, L Shi - Automatica, 2018 - Elsevier
In this work, a security problem in cyber–physical systems is studied. We consider a remote
state estimation scenario where a sensor transmits its measurement to a remote estimator …

Secure state estimation for cyber-physical systems under sensor attacks: A satisfiability modulo theory approach

Y Shoukry, P Nuzzo, A Puggelli… - … on Automatic Control, 2017 - ieeexplore.ieee.org
Secure state estimation is the problem of estimating the state of a dynamical system from a
set of noisy and adversarially corrupted measurements. Intrinsically a combinatorial …

Data-injection attacks in stochastic control systems: Detectability and performance tradeoffs

CZ Bai, F Pasqualetti, V Gupta - Automatica, 2017 - Elsevier
Consider a stochastic process being controlled across a communication channel. The
control signal that is transmitted across the control channel can be replaced by a malicious …

Optimal stealthy false data injection attacks in cyber-physical systems

YG Li, GH Yang - Information Sciences, 2019 - Elsevier
In this paper, the problem of false data injection attacks for cyber-physical systems is
investigated. The Kullback–Leibler divergence is utilized to measure the stealthiness of the …

On Kalman filtering with compromised sensors: Attack stealthiness and performance bounds

CZ Bai, V Gupta, F Pasqualetti - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
Control systems operate under the assumption that sensors are trustworthy. Yet, when
communication channels are unprotected or sensors are accessible from networked …

Secure state estimation against sensor attacks in the presence of noise

S Mishra, Y Shoukry, N Karamchandani… - … on Control of …, 2016 - ieeexplore.ieee.org
We consider the problem of estimating the state of a noisy linear dynamical system when an
unknown subset of sensors is arbitrarily corrupted by an adversary. We propose a secure …

Optimal stealthy innovation-based attacks with historical data in cyber-physical systems

YG Li, GH Yang - IEEE Transactions on Systems, Man, and …, 2019 - ieeexplore.ieee.org
The problem of stealthy innovation-based attacks in cyber-physical systems is studied in this
paper. Different from the existing results which only utilize the current data, a more general …

Security in stochastic control systems: Fundamental limitations and performance bounds

CZ Bai, F Pasqualetti, V Gupta - 2015 American Control …, 2015 - ieeexplore.ieee.org
This work proposes a novel metric to characterize the resilience of stochastic cyber-physical
systems to attacks and faults. We consider a single-input single-output plant regulated by a …