Butterfly attack: Adversarial manipulation of temporal properties of cyber-physical systems

R Mahfouzi, A Aminifar, S Samii… - 2019 IEEE Real …, 2019 - ieeexplore.ieee.org
Increasing internet connectivity poses an existential threat for cyber-physical systems.
Securing these safety-critical systems becomes an important challenge. Cyber-physical …

Chronos: Timing interference as a new attack vector on autonomous cyber-physical systems

A Li, J Wang, N Zhang - Proceedings of the 2021 ACM SIGSAC …, 2021 - dl.acm.org
Timing property plays a vital role in the Cyber-Physical System (CPS) due to its interaction
with the physical world. The smooth operation of these robotic systems often relies on an …

ICS security testbed with delay attack case study

E Korkmaz, A Dolgikh, M Davis… - MILCOM 2016-2016 …, 2016 - ieeexplore.ieee.org
Critical infrastructure components are digitally controlled and operate alongside setups of
interconnected machinery, computers and network devices, ie as cyber-physical systems. As …

Control synthesis for cyber-physical systems to satisfy metric interval temporal logic objectives under timing and actuator attacks

L Niu, B Ramasubramanian, A Clark… - 2020 ACM/IEEE 11th …, 2020 - ieeexplore.ieee.org
This paper studies the synthesis of controllers for cyber-physical systems (CPSs) that are
required to carry out complex tasks that are time-sensitive, in the presence of an adversary …

Minimizing side-channel attack vulnerability via schedule randomization

N Vreman, R Pates, K Krüger, G Fohler… - 2019 IEEE 58th …, 2019 - ieeexplore.ieee.org
Control systems can be vulnerable to security threats where an attacker gathers information
about the execution of the system. In particular, side-channel attacks exploit the predictability …

Improving security for time-triggered real-time systems with task replication

K Krüger, G Fohler, M Völp… - 2018 IEEE 24th …, 2018 - ieeexplore.ieee.org
Time-triggered real-time systems achieve deterministic behaviour, making them suitable for
safety-critical environments. However, this determinism also allows attackers to finetune …

Polyrhythm: Adaptive tuning of a multi-channel attack template for timing interference

A Li, M Sudvarg, H Liu, Z Yu, C Gill… - 2022 IEEE Real-Time …, 2022 - ieeexplore.ieee.org
As cyber-physical systems have become increasingly complex, rising computational
demand has led to the ubiquitous use of multicore processors in embedded environments …

Detection and mitigation of time delay injection attacks on industrial control systems with PLCs

E Korkmaz, M Davis, A Dolgikh, V Skormin - Computer Network Security …, 2017 - Springer
National security agencies are increasingly concerned about cyber threats to Industrial
Control Systems (ICS). For this reason, the detection and mitigation of cyber-attacks on ICS …

Attack detection through monitoring of timing deviations in embedded real-time systems

N Bellec, S Rokicki, I Puaut - ECRTS 2020-32nd Euromicro …, 2020 - inria.hal.science
Real-time embedded systems (RTES) are required to interact more and more with their
environment, thereby increasing their attack surface. Recent security breaches on car …

A novel side-channel in real-time schedulers

CY Chen, S Mohan, R Pellizzoni… - 2019 IEEE Real …, 2019 - ieeexplore.ieee.org
We demonstrate the presence of a novel scheduler side-channel in preemptive, fixed-priority
real-time systems (RTS); examples of such systems can be found in automotive systems …