Safety and Liveness of Software Rejuvenation for Secure Tracking Control

Software rejuvenation is the concept of scheduling periodic system reboots to eliminate sources of potential failures due to unanticipated states in the run-time system. It has been proposed recently as a way to improve security of cyber-physical systems (CPSs) against undetectable cyber-attacks that change run-time code or data towards malicious ends. This paper presents proofs of safety and liveness for a recently proposed scheme for software rejuvenation for tracking control systems based on Lyapunov functions and invariant sets.

[1]  Domenico Cotroneo,et al.  A survey of software aging and rejuvenation studies , 2014, ACM J. Emerg. Technol. Comput. Syst..

[2]  Sagar Chaki,et al.  überSpark: Enforcing Verifiable Object Abstractions for Automated Compositional Security Analysis of a Hypervisor , 2016, USENIX Security Symposium.

[3]  Marco Caccamo,et al.  Guaranteed Physical Security with Restart-Based Design for Cyber-Physical Systems , 2018, 2018 ACM/IEEE 9th International Conference on Cyber-Physical Systems (ICCPS).

[4]  W. Marsden I and J , 2012 .

[5]  Franco Blanchini,et al.  Set invariance in control , 1999, Autom..

[6]  Bruno Sinopoli,et al.  Design of Software Rejuvenation for CPS Security Using Invariant Sets , 2018, 2019 American Control Conference (ACC).

[7]  Yennun Huang,et al.  Software rejuvenation: analysis, module and applications , 1995, Twenty-Fifth International Symposium on Fault-Tolerant Computing. Digest of Papers.

[8]  Danna Zhou,et al.  d. , 1934, Microbial pathogenesis.

[9]  Jong Sou Park,et al.  Software Rejuvenation Approach to Security Engineering , 2004, ICCSA.

[10]  Kishor S. Trivedi,et al.  Software Rejuvenation: Do IT & Telco Industries Use It? , 2012, 2012 IEEE 23rd International Symposium on Software Reliability Engineering Workshops.

[11]  Stephen P. Boyd,et al.  Convex Optimization , 2004, Algorithms and Theory of Computation Handbook.

[12]  Chen-Yu Lee,et al.  Security Through Software Rejuvenation , 2014, ICSEA 2014.

[13]  R. Beard Quadrotor Dynamics and Control , 2008 .

[14]  E. Yaz Linear Matrix Inequalities In System And Control Theory , 1998, Proceedings of the IEEE.

[15]  Marco Caccamo,et al.  Preserving Physical Safety Under Cyber Attacks , 2019, IEEE Internet of Things Journal.

[16]  Stephen P. Boyd,et al.  Linear Matrix Inequalities in Systems and Control Theory , 1994 .