skip to main content
10.1145/3489517.3530555acmconferencesArticle/Chapter ViewAbstractPublication PagesdacConference Proceedingsconference-collections
research-article
Public Access

Adaptive window-based sensor attack detection for cyber-physical systems

Published: 23 August 2022 Publication History

Abstract

Sensor attacks alter sensor readings and spoof Cyber-Physical Systems (CPS) to perform dangerous actions. Existing detection works tend to minimize the detection delay and false alarms at the same time, while there is a clear trade-off between the two metrics. Instead, we argue that attack detection should dynamically balance the two metrics when a physical system is at different states. Along with this argument, we propose an adaptive sensor attack detection system that consists of three components - an adaptive detector, detection deadline estimator, and data logger. It can adapt the detection delay and thus false alarms at run time to meet a varying detection deadline and improve usability (or false alarms). Finally, we implement our detection system and validate it using multiple CPS simulators and a reduced-scale autonomous vehicle testbed.

References

[1]
Hongjun Choi, Wen-Chuan Lee, Yousra Aafer, Fan Fei, Zhan Tu, Xiangyu Zhang, Dongyan Xu, and Xinyan Deng. 2018. Detecting attacks against robotic vehicles: A control invariant approach. In Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. 801--816.
[2]
Jairo Giraldo, David Urbina, Alvaro Cardenas, Junia Valente, Mustafa Faisal, Justin Ruths, Nils Ole Tippenhauer, Henrik Sandberg, and Richard Candell. 2018. A survey of physics-based attack detection in cyber-physical systems. ACM Computing Surveys (CSUR) 51, 4 (2018), 1--36.
[3]
Tianjia He, Lin Zhang, Fanxin Kong, and Asif Salekin. 2020. Exploring Inherent Sensor Redundancy for Automotive Anomaly Detection. In 57th Design Automation Conference. ACM.
[4]
Fanxin Kong, Oleg Sokolsky, James Weimer, and Insup Lee. 2019. State Consistencies for Cyber-Physical System Recovery. In Workshop on Cyber-Physical Systems Security and Resilience (CPS-SR).
[5]
Colas Le Guernic. 2009. Reachability Analysis of Hybrid Systems with Linear Continuous Dynamics. Theses. Université Joseph-Fourier - Grenoble I. https://tel.archives-ouvertes.fr/tel-00422569
[6]
Raul Quinonez, Jairo Giraldo, Luis Salazar, Erick Bauman, Alvaro Cardenas, and Zhiqiang Lin. 2020. SAVIOR: Securing Autonomous Vehicles with Robust Physical Invariants. In 29th USENIX Security Symposium (USENIX Security 20).
[7]
Aviva Hope Rutkin. 2013. spoofers use fake GPS signals to knock a yacht off course. MIT Technology Review (2013).
[8]
Francesco Sabatino. 2015. Quadrotor control: modeling, nonlinearcontrol design, and simulation. Master's thesis. KTH, Automatic Control.
[9]
Yunmok Son, Hocheol Shin, Dongkwan Kim, Youngseok Park, Juhwan Noh, Kibum Choi, Jungwoo Choi, and Yongdae Kim. 2015. Rocking drones with intentional sound noise on gyroscopic sensors. In 24th USENIX Security Symposium (USENIX Security 15). 881--896.
[10]
David I Urbina, Jairo A Giraldo, Alvaro A Cardenas, Nils Ole Tippenhauer, Junia Valente, Mustafa Faisal, Justin Ruths, Richard Candell, and Henrik Sandberg. 2016. Limiting the impact of stealthy attacks on industrial control systems. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. 1092--1105.
[11]
Ruixuan Wang, Fanxin Kong, Hasshi Sudler, and Xun Jiao. 2021. HDAD: Hyperdimensional Computing-based Anomaly Detection for Automotive Sensor Attacks. In 27th IEEE Real-Time and Embedded Technology and Applications Symposium (RTAS), Brief Industry Paper Track. IEEE.
[12]
Chen Yan, Hocheol Shin, Connor Bolton, Wenyuan Xu, Yongdae Kim, and Kevin Fu. 2020. SoK: A Minimalist Approach to Formalizing Analog Sensor Security. In 2020 IEEE Symposium on Security and Privacy (SP). 480--495.
[13]
Lin Zhang, Xin Chen, Fanxin Kong, and Alvaro A. Cardenas. 2020. Real-Time Recovery for Cyber-Physical Systems using Linear Approximations. In 41st IEEE Real-Time Systems Symposium (RTSS). IEEE.
[14]
Lin Zhang, Pengyuan Lu, Fanxin Kong, Xin Chen, Oleg Sokolsky, and Insup Lee. 2021. Real-Time Attack-Recovery for Cyber-Physical Systems using Linear-Quadratic Regulator. In 21st ACM SIGBED International Conference on Embedded Software (EMSOFT).
[15]
Youqian Zhang and KB Rasmussen. 2020. Detection of electromagnetic interference attacks on sensor systems. In IEEE Symposium on Security and Privacy (S&P).

Cited By

View all
  • (2024)CPSim: Simulation Toolbox for Security Problems in Cyber-Physical SystemsACM Transactions on Design Automation of Electronic Systems10.1145/367490429:5(1-16)Online publication date: 25-Jun-2024
  • (2024)Recovery from Adversarial Attacks in Cyber-physical Systems: Shallow, Deep, and Exploratory WorksACM Computing Surveys10.1145/365397456:8(1-31)Online publication date: 26-Apr-2024
  • (2024)Path Planning for UAVs under GPS Permanent FaultsACM Transactions on Cyber-Physical Systems10.1145/36530748:3(1-23)Online publication date: 29-Jul-2024
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
DAC '22: Proceedings of the 59th ACM/IEEE Design Automation Conference
July 2022
1462 pages
ISBN:9781450391429
DOI:10.1145/3489517
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 23 August 2022

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. attack detection
  2. cyber-physical systems
  3. detection deadline

Qualifiers

  • Research-article

Funding Sources

Conference

DAC '22
Sponsor:
DAC '22: 59th ACM/IEEE Design Automation Conference
July 10 - 14, 2022
California, San Francisco

Acceptance Rates

Overall Acceptance Rate 1,770 of 5,499 submissions, 32%

Upcoming Conference

DAC '25
62nd ACM/IEEE Design Automation Conference
June 22 - 26, 2025
San Francisco , CA , USA

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)166
  • Downloads (Last 6 weeks)23
Reflects downloads up to 05 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2024)CPSim: Simulation Toolbox for Security Problems in Cyber-Physical SystemsACM Transactions on Design Automation of Electronic Systems10.1145/367490429:5(1-16)Online publication date: 25-Jun-2024
  • (2024)Recovery from Adversarial Attacks in Cyber-physical Systems: Shallow, Deep, and Exploratory WorksACM Computing Surveys10.1145/365397456:8(1-31)Online publication date: 26-Apr-2024
  • (2024)Path Planning for UAVs under GPS Permanent FaultsACM Transactions on Cyber-Physical Systems10.1145/36530748:3(1-23)Online publication date: 29-Jul-2024
  • (2024)Backdoor Attacks on Safe Reinforcement Learning-Enabled Cyber–Physical SystemsIEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems10.1109/TCAD.2024.344746843:11(4093-4104)Online publication date: Nov-2024
  • (2024)Work in Progress: Emerging from Shadows: Optimal Hidden Actuator Attack to Cyber-Physical Systems2024 IEEE 30th Real-Time and Embedded Technology and Applications Symposium (RTAS)10.1109/RTAS61025.2024.00044(406-409)Online publication date: 13-May-2024
  • (2024)Fast Attack Recovery for Stochastic Cyber-Physical Systems2024 IEEE 30th Real-Time and Embedded Technology and Applications Symposium (RTAS)10.1109/RTAS61025.2024.00030(280-293)Online publication date: 13-May-2024
  • (2024)Pinpointing Actuator Attacks: A Novel Diagnostic Framework for Cyber-Physical Systems2024 International Conference on Assured Autonomy (ICAA)10.1109/ICAA64256.2024.00019(77-86)Online publication date: 10-Oct-2024
  • (2023)Practical Software Defense for GPS Spoofing on a Hobby UAVProceedings of the First International Workshop on Security and Privacy of Sensing Systems10.1145/3628356.3630119(37-43)Online publication date: 12-Nov-2023
  • (2023)Optimal Checkpointing Strategy for Real-time Systems with Both Logical and Timing CorrectnessACM Transactions on Embedded Computing Systems10.1145/360317222:4(1-21)Online publication date: 24-Jul-2023
  • (2023)Learn-to-Respond: Sequence-Predictive Recovery from Sensor Attacks in Cyber-Physical Systems2023 IEEE Real-Time Systems Symposium (RTSS)10.1109/RTSS59052.2023.00017(78-91)Online publication date: 5-Dec-2023
  • Show More Cited By

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Login options

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media