Sökning: WFRF:(Eles Petru Professor)
> (2020-2023) >
Security-Aware Desi...
Security-Aware Design of Cyber-Physical Systems for Control Applications
-
- Mahfouzi, Rouhollah, 1989- (författare)
- Linköpings universitet,Programvara och system,Tekniska fakulteten,ESLAB
-
- Eles, Petru Ion, Professor, 1954- (preses)
- Linköpings universitet,Programvara och system,Tekniska fakulteten
-
- Peng, Zebo, Professor, 1958- (preses)
- Linköpings universitet,Programvara och system,Tekniska fakulteten
-
visa fler...
-
- Chakraborty, Samarjit, Professor (opponent)
- Computer Science Department, University of North Carolina at Chapel Hill, Chapel Hill, United States
-
visa färre...
-
(creator_code:org_t)
- ISBN 9789179290214
- Linköping : Linköping University Electronic Press, 2021
- Engelska 196 s.
-
Serie: Linköping Studies in Science and Technology. Dissertations, 0345-7524 ; 2168
- Relaterad länk:
-
https://doi.org/10.3...
-
visa fler...
-
https://liu.diva-por... (primary) (Raw object)
-
https://liu.diva-por... (Preview)
-
http://liu.diva-port...
-
https://urn.kb.se/re...
-
https://doi.org/10.3...
-
visa färre...
Abstract
Ämnesord
Stäng
- With cyber-physical systems opening to the outside world, security can no longer be considered a secondary issue. In this work, we focus on security threats to control applications in cyber-physical systems. We provide detection, prevention, and mitigation solutions to attacks considering the stringent resource constraints and important properties of such systems. First, we highlight some important properties of control applications that are used to design an intrusion detection and mitigation mechanism. We show how the control laws, derived from the physical properties of control applications, can facilitate the intrusion detection mechanism. We also use a resource management approach to maintain the performance of the control application under attack. Second, we elaborate on the challenges derived from sharing a processor among several controller tasks. We investigate the counter-intuitive timing anomalies that result from such resource sharing and introduce the Butterfly attack which exploits these anomalies. With the Butterfly attack, the adversary interferes with a low criticality and less protected task to change the timing behavior of the other tasks sharing the same platform. We experimentally show how this attack can indirectly destabilize a high criticality and, potentially, more protected task. Then, we consider real-time communication of control applications over a Time-Triggered Ethernet network. We demonstrate the impact of varying delays on control stability and identify the route and schedule constraints that are necessary to guarantee stability. On top of that, we study the impact of encryption and decryption delays on stability and employ a design space exploration approach to maximize security while continuing to satisfy stability guarantees.
Ämnesord
- NATURVETENSKAP -- Data- och informationsvetenskap -- Datavetenskap (hsv//swe)
- NATURAL SCIENCES -- Computer and Information Sciences -- Computer Sciences (hsv//eng)
Publikations- och innehållstyp
- vet (ämneskategori)
- dok (ämneskategori)
Hitta via bibliotek
Till lärosätets databas