Abstract
The world of Cyber-Physical Systems ranges from industrial to national interest applications. Even though these systems are pervading our everyday life, we are still far from fully understanding their security properties. Devising a suitable attacker model is a crucial element when studying the security properties of CPSs, as a system cannot be secured without defining the threats it is subject to. In this work an attacker scenario is presented which addresses the peculiarities of a cyber-physical adversary, and we discuss how this scenario relates to other attacker models popular in the security protocol literature.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Anand, M., Cronin, E., Sherr, M., Blaze, M., Ives, Z., Lee, I.: Security Challenges in Next Generation Cyber Physical Systems. In: Beyond SCADA: Cyber Physical Systems Meeting, HCSS-NEC4CPS (2006)
Anand, M., Ives, Z., Lee, I.: Quantifying Eavesdropping Vulnerability in Sensor Networks. In: 2nd VLDB Workshop on Data Management for Sensor Networks, DMSN (2005)
Basin, D., Capkun, S., Schaller, P., Schmidt, B.: Formal Reasoning about Physical Properties of Security Protocols. ACM Transactions on Information and System Security (TISSEC)Â 14(2), 16 (2011)
Basin, D., Cremers, C.: Degrees of Security: Protocol Guarantees in the Face of Compromising Adversaries. In: Dawar, A., Veith, H. (eds.) CSL 2010. LNCS, vol. 6247, pp. 1–18. Springer, Heidelberg (2010)
Benenson, Z., Cholewinski, P., Freiling, F.: Vulnerabilities and attacks in wireless sensor networks. In: Lopez, J., Zhou, J. (eds.) Wireless Sensors Networks Security. IOS Press (2007)
Benenson, Z., Dewald, A., Freiling, F.: Presence, Intervention, Insertion: Unifying Attack and Failure Models in Wireless Sensor Networks. Technical report, University of Mannheim (2009)
Blanchet, B.: Automatic verification of correspondences for security protocols. Journal of Computer Security 17(4), 363–434 (2009)
Buchholtz, M., Nielson, H.R., Nielson, F.: A Calculus for Control Flow Analysis of Security Protocols. International Journal of Information Security 2(3-4), 145–167 (2004)
Burmester, M., Magkos, E.: Modeling Security in Cyber-Physical Systems. In: Sixth Annual IFIP Working Group 11.10 International Conference on Critical Infrastructure Protection (2012)
Cárdenas, A., Amin, S., Sastry, S.: Secure Control: Towards Survivable Cyber-Physical Systems. In: 28th International Conference on Distributed Computing Systems, ICDCS 2008 Workshops (2008)
Cárdenas, A., Amin, S., Sinopoli, B., Giani, A., Perrig, A., Sastry, S.: Challenges for Securing Cyber Physical Systems. In: Workshop on Future Directions in Cyber-physical Systems Security (2009)
Di Mauro, A., Papini, D., Vigo, R., Dragoni, N.: Toward a Threat Model for Energy-Harvesting Wireless Sensor Networks. In: Benlamri, R. (ed.) NDT 2012, Part II. CCIS, vol. 294, pp. 289–301. Springer, Heidelberg (2012)
Dolev, D.: The Byzantine generals strike again. Journal of Algorithms 30, 14–30 (1982)
Dolev, D., Yao, A.: On the security of public key protocols. IEEE Transactions on Information Theory 29(2), 198–208 (1983)
Gamage, T.T., McMillin, B.M., Roth, T.P.: Enforcing Information Flow Security Properties in Cyber-Physical Systems: A Generalized Framework Based on Compensation. In: 34th Annual Computer Software and Applications Conference Workshops, IEEE COMPSACW 2010 (2010)
Gamage, T.T., Roth, T.P., McMillin, B.M.: Confidentiality Preserving Security Properties for Cyber-Physical Systems. In: 35th IEEE Annual Computer Software and Applications Conference (2011)
Goldwasser, S., Micali, S., Rivest, R.L.: A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks. SIAM J. Comput. 17(2) (1988)
Lee, E.A.: Cyber Physical Systems: Design Challenges. In: International Symposium on Object/Component/Service-Oriented Real-Time Distributed Computing, ISORC (2008)
Neuman, C.: Challenges in Security for Cyber-Physical Systems. In: DHS Workshop on Future Directions in Cyber-Physical Systems Security (2009)
Shi, J., Wan, J., Yan, H., Suo, H.: A Survey of Cyber Physical Systems. In: International Conference on Wireless Communications and Signal Processing, WSCP 2011 (2011)
Xiao, K., Ren, S., Kwiat, K.: Retrofitting Cyber Physical Systems for Survivability through External Coordination. In: 41st Hawaii International Conference on System Sciences (2008)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Vigo, R. (2012). The Cyber-Physical Attacker. In: Ortmeier, F., Daniel, P. (eds) Computer Safety, Reliability, and Security. SAFECOMP 2012. Lecture Notes in Computer Science, vol 7613. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-33675-1_31
Download citation
DOI: https://doi.org/10.1007/978-3-642-33675-1_31
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-33674-4
Online ISBN: 978-3-642-33675-1
eBook Packages: Computer ScienceComputer Science (R0)