Skip to main content

The Cyber-Physical Attacker

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNPSE,volume 7613))

Abstract

The world of Cyber-Physical Systems ranges from industrial to national interest applications. Even though these systems are pervading our everyday life, we are still far from fully understanding their security properties. Devising a suitable attacker model is a crucial element when studying the security properties of CPSs, as a system cannot be secured without defining the threats it is subject to. In this work an attacker scenario is presented which addresses the peculiarities of a cyber-physical adversary, and we discuss how this scenario relates to other attacker models popular in the security protocol literature.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Anand, M., Cronin, E., Sherr, M., Blaze, M., Ives, Z., Lee, I.: Security Challenges in Next Generation Cyber Physical Systems. In: Beyond SCADA: Cyber Physical Systems Meeting, HCSS-NEC4CPS (2006)

    Google Scholar 

  2. Anand, M., Ives, Z., Lee, I.: Quantifying Eavesdropping Vulnerability in Sensor Networks. In: 2nd VLDB Workshop on Data Management for Sensor Networks, DMSN (2005)

    Google Scholar 

  3. Basin, D., Capkun, S., Schaller, P., Schmidt, B.: Formal Reasoning about Physical Properties of Security Protocols. ACM Transactions on Information and System Security (TISSEC) 14(2), 16 (2011)

    Article  Google Scholar 

  4. Basin, D., Cremers, C.: Degrees of Security: Protocol Guarantees in the Face of Compromising Adversaries. In: Dawar, A., Veith, H. (eds.) CSL 2010. LNCS, vol. 6247, pp. 1–18. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  5. Benenson, Z., Cholewinski, P., Freiling, F.: Vulnerabilities and attacks in wireless sensor networks. In: Lopez, J., Zhou, J. (eds.) Wireless Sensors Networks Security. IOS Press (2007)

    Google Scholar 

  6. Benenson, Z., Dewald, A., Freiling, F.: Presence, Intervention, Insertion: Unifying Attack and Failure Models in Wireless Sensor Networks. Technical report, University of Mannheim (2009)

    Google Scholar 

  7. Blanchet, B.: Automatic verification of correspondences for security protocols. Journal of Computer Security 17(4), 363–434 (2009)

    Google Scholar 

  8. Buchholtz, M., Nielson, H.R., Nielson, F.: A Calculus for Control Flow Analysis of Security Protocols. International Journal of Information Security 2(3-4), 145–167 (2004)

    Article  Google Scholar 

  9. Burmester, M., Magkos, E.: Modeling Security in Cyber-Physical Systems. In: Sixth Annual IFIP Working Group 11.10 International Conference on Critical Infrastructure Protection (2012)

    Google Scholar 

  10. Cárdenas, A., Amin, S., Sastry, S.: Secure Control: Towards Survivable Cyber-Physical Systems. In: 28th International Conference on Distributed Computing Systems, ICDCS 2008 Workshops (2008)

    Google Scholar 

  11. Cárdenas, A., Amin, S., Sinopoli, B., Giani, A., Perrig, A., Sastry, S.: Challenges for Securing Cyber Physical Systems. In: Workshop on Future Directions in Cyber-physical Systems Security (2009)

    Google Scholar 

  12. Di Mauro, A., Papini, D., Vigo, R., Dragoni, N.: Toward a Threat Model for Energy-Harvesting Wireless Sensor Networks. In: Benlamri, R. (ed.) NDT 2012, Part II. CCIS, vol. 294, pp. 289–301. Springer, Heidelberg (2012)

    Google Scholar 

  13. Dolev, D.: The Byzantine generals strike again. Journal of Algorithms 30, 14–30 (1982)

    Article  MathSciNet  Google Scholar 

  14. Dolev, D., Yao, A.: On the security of public key protocols. IEEE Transactions on Information Theory 29(2), 198–208 (1983)

    Article  MathSciNet  MATH  Google Scholar 

  15. Gamage, T.T., McMillin, B.M., Roth, T.P.: Enforcing Information Flow Security Properties in Cyber-Physical Systems: A Generalized Framework Based on Compensation. In: 34th Annual Computer Software and Applications Conference Workshops, IEEE COMPSACW 2010 (2010)

    Google Scholar 

  16. Gamage, T.T., Roth, T.P., McMillin, B.M.: Confidentiality Preserving Security Properties for Cyber-Physical Systems. In: 35th IEEE Annual Computer Software and Applications Conference (2011)

    Google Scholar 

  17. Goldwasser, S., Micali, S., Rivest, R.L.: A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks. SIAM J. Comput. 17(2) (1988)

    Google Scholar 

  18. Lee, E.A.: Cyber Physical Systems: Design Challenges. In: International Symposium on Object/Component/Service-Oriented Real-Time Distributed Computing, ISORC (2008)

    Google Scholar 

  19. Neuman, C.: Challenges in Security for Cyber-Physical Systems. In: DHS Workshop on Future Directions in Cyber-Physical Systems Security (2009)

    Google Scholar 

  20. Shi, J., Wan, J., Yan, H., Suo, H.: A Survey of Cyber Physical Systems. In: International Conference on Wireless Communications and Signal Processing, WSCP 2011 (2011)

    Google Scholar 

  21. Xiao, K., Ren, S., Kwiat, K.: Retrofitting Cyber Physical Systems for Survivability through External Coordination. In: 41st Hawaii International Conference on System Sciences (2008)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Vigo, R. (2012). The Cyber-Physical Attacker. In: Ortmeier, F., Daniel, P. (eds) Computer Safety, Reliability, and Security. SAFECOMP 2012. Lecture Notes in Computer Science, vol 7613. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-33675-1_31

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-33675-1_31

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-33674-4

  • Online ISBN: 978-3-642-33675-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics