Overview of discrete event systems opacity: Models, validation, and quantification
Over the last decade, opacity of discrete event systems (DES) has become a very fertile field
of research. Driven by safety and privacy concerns in network communications and online …
of research. Driven by safety and privacy concerns in network communications and online …
On the history of diagnosability and opacity in discrete event systems
This paper presents historical remarks on key projects and papers that led to the
development of a theory of event diagnosis for discrete event systems modeled by finite …
development of a theory of event diagnosis for discrete event systems modeled by finite …
Synthesis of sensor deception attacks at the supervisory layer of cyber–physical systems
We study the security of Cyber–Physical Systems (CPS) in the context of the supervisory
control layer. Specifically, we propose a general model of a CPS attacker in the framework of …
control layer. Specifically, we propose a general model of a CPS attacker in the framework of …
Verification of state-based opacity using Petri nets
A system is said to be opaque if a given secret behavior remains opaque (uncertain) to an
intruder who can partially observe system activities. This work addresses the verification of …
intruder who can partially observe system activities. This work addresses the verification of …
Secure-by-construction synthesis of cyber-physical systems
Correct-by-construction synthesis is a cornerstone of the confluence of formal methods and
control theory towards designing safety-critical systems. Instead of following the time-tested …
control theory towards designing safety-critical systems. Instead of following the time-tested …
Enhancement of opacity for distributed state estimation in cyber–physical systems
L An, GH Yang - Automatica, 2022 - Elsevier
Opacity, a confidentiality property that characterizes whether a “secret” of a system can be
inferred by an outside intruder, is an increasing concern in cyber–physical systems (CPSs) …
inferred by an outside intruder, is an increasing concern in cyber–physical systems (CPSs) …
A new approach for the verification of infinite-step and K-step opacity using two-way observers
X Yin, S Lafortune - Automatica, 2017 - Elsevier
In the context of security analysis for information flow properties, where a potentially
malicious observer (intruder) tracks the observed behavior of a given system, infinite-step …
malicious observer (intruder) tracks the observed behavior of a given system, infinite-step …
Analysis and control for resilience of discrete event systems: Fault diagnosis, opacity and cyber security
Abstract System resilience captures the ability of the system to withstand a major disruption
within acceptable performance degradation and to recover within an acceptable time frame …
within acceptable performance degradation and to recover within an acceptable time frame …
Synthesis of supervisors robust against sensor deception attacks
R Meira-Góes, S Lafortune… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
We consider feedback control systems where sensor readings may be compromised by a
malicious attacker intending on causing damage to the system. We study this problem at the …
malicious attacker intending on causing damage to the system. We study this problem at the …
Stealthy deception attacks for cyber-physical systems
We study the security of Cyber-Physical Systems (CPS) in the context of the supervisory
control layer. Specifically, we propose a general model of a CPS attacker in the framework of …
control layer. Specifically, we propose a general model of a CPS attacker in the framework of …