Integrating security in resource-constrained cyber-physical systems
Defense mechanisms against network-level attacks are commonly based on the use of
cryptographic techniques, such as lengthy message authentication codes (MAC) that …
cryptographic techniques, such as lengthy message authentication codes (MAC) that …
Relaxing integrity requirements for attack-resilient cyber-physical systems
I Jovanov, M Pajic - IEEE Transactions on Automatic Control, 2019 - ieeexplore.ieee.org
The increase in network connectivity has also resulted in several high-profile attacks on
cyber-physical systems. An attacker that manages to access a local network could remotely …
cyber-physical systems. An attacker that manages to access a local network could remotely …
Security-aware scheduling of embedded control tasks
In this work, we focus on securing cyber-physical systems (CPS) in the presence of network-
based attacks, such as Man-in-the-Middle (MitM) attacks, where a stealthy attacker is able to …
based attacks, such as Man-in-the-Middle (MitM) attacks, where a stealthy attacker is able to …
[图书][B] Security-aware design for cyber-physical systems
CW Lin, A Sangiovanni-Vincentelli - 2017 - Springer
As computational technology advances, more and more systems in daily life are controlled
or supported by algorithms and computers. The most representative evolution includes the …
or supported by algorithms and computers. The most representative evolution includes the …
Network scheduling for secure cyber-physical systems
Existing design techniques for providing security guarantees against network-based attacks
in cyber-physical systems (CPS) are based on continuous use of standard cryptographic …
in cyber-physical systems (CPS) are based on continuous use of standard cryptographic …
Eliminating inter-domain vulnerabilities in cyber-physical systems: An analysis contracts approach
Designing secure cyber-physical systems (CPS) is a particularly difficult task since security
vulnerabilities stem not only from traditional cybersecurity concerns, but also physical ones …
vulnerabilities stem not only from traditional cybersecurity concerns, but also physical ones …
Towards ensuring security by design in cyber-physical systems engineering processes
Engineering cyber-physical systems secure by design requires engineers to consider
security from the ground up. However, current systems engineering processes are not …
security from the ground up. However, current systems engineering processes are not …
Cross-layer codesign for secure cyber-physical systems
Security attacks may have disruptive consequences on cyber-physical systems, and lead to
significant social and economic losses. Building secure cyber-physical systems is …
significant social and economic losses. Building secure cyber-physical systems is …
Introduction to cyber-physical system security: A cross-layer perspective
Cyber-physical systems (CPS) comprise the backbone of national critical infrastructures
such as power grids, transportation systems, home automation systems, etc. Because cyber …
such as power grids, transportation systems, home automation systems, etc. Because cyber …
Robust, secure, and cost-effective design for cyber-physical systems
Robust, Secure, and Cost-Effective Design for Cyber-Physical Systems Page 1 66 1541-1672/14/$31.00
© 2014 IEEE Ieee InTeLLIGenT SySTeMS Published by the IEEE Computer Society CYBER-PHYSICAL-SOCIAL …
© 2014 IEEE Ieee InTeLLIGenT SySTeMS Published by the IEEE Computer Society CYBER-PHYSICAL-SOCIAL …