Cyber-Physical Systems Security

We argue that cyber-physical systems cannot be protected just by protecting their IT infrastructure and that the CIA approach to security is insufficient. Rather, the IT components should be treated as a control system, inputs to that control system should be checked for veracity, and control algorithms should be designed in a way that they can handle a certain amount of adversarial actions.

[1]  T. N. Stevenson,et al.  Fluid Mechanics , 2021, Nature.

[2]  Dieter Gollmann Veracity, Plausibility, and Reputation , 2012, WISTP.

[3]  Roy Arends,et al.  DNS for Fun and Profit , 2005 .

[4]  Alvaro A. Cárdenas,et al.  CPS: driving cyber-physical systems to unsafe operating conditions by timing DoS attacks on sensor signals , 2014, ACSAC.

[5]  David D. Clark,et al.  A Comparison of Commercial and Military Computer Security Policies , 1987, 1987 IEEE Symposium on Security and Privacy.

[6]  Ashkan Sami,et al.  Employing secure coding practices into industrial applications: a case study , 2014, Empirical Software Engineering.

[7]  Niklas Borselius Mobile agent security , 2002 .

[8]  Ralph Langner To Kill a Centrifuge A Technical Analysis of What Stuxnet ’ s Creators Tried to Achieve , 2013 .

[9]  Edward A. Lee Cyber-physical Systems -are Computing Foundations Adequate? Position Paper for Nsf Workshop on Cyber-physical Systems: Research Motivation, Techniques and Roadmap , 1998 .

[10]  Jan Hruska Computer viruses , 1990 .

[11]  Ronald C. Dodge,et al.  Technology Education at the US Military Academy , 2005, IEEE Secur. Priv..

[12]  Robert Allan Leishear Fluid Mechanics, Water Hammer, Dynamic Stresses and Piping Design , 2013 .

[13]  Srdjan Capkun,et al.  Attacks on public WLAN-based positioning systems , 2009, MobiSys '09.

[14]  Micah Sherr,et al.  Veracity: Practical Secure Network Coordinates via Vote-based Agreements , 2009, USENIX Annual Technical Conference.

[15]  Srdjan Capkun,et al.  On the requirements for successful GPS spoofing attacks , 2011, CCS '11.

[16]  Ralph Langner,et al.  Stuxnet: Dissecting a Cyberwarfare Weapon , 2011, IEEE Security & Privacy.