Guaranteed physical security with restart-based design for cyber-physical systems

F Abdi, CY Chen, M Hasan, S Liu… - 2018 ACM/IEEE 9th …, 2018 - ieeexplore.ieee.org
Physical plants that form the core of the Cyber-Physical Systems (CPS) often have stringent
safety requirements. Recent attacks have shown that cyber intrusions can result in the safety …

[PDF][PDF] Effective analysis of attack trees: A model-driven approach

R Kumar, S Schivo, E Ruijters, BM Yildiz… - … , FASE 2018, Held as …, 2018 - library.oapen.org
Attack trees (ATs) are a popular formalism for security analysis, and numerous variations
and tools have been developed around them. These were mostly developed independently …

Parametric analyses of attack-fault trees

É André, D Lime, M Ramparison… - Fundamenta …, 2021 - content.iospress.com
Risk assessment of cyber-physical systems, such as power plants, connected devices and IT-
infrastructures has always been challenging: safety (ie, absence of unintentional failures) …

Generation of cyberattacks leading to safety top event using altarica: an automotive case study

T Serru, N Nguyen, M Batteux, A Rauzy… - 23e Congrès de …, 2022 - hal.science
Cyber-Physical Systems (CPS) are safety critical as they can be at risk for their users and
environment. It is thus paramount to assess all risks related to their use, including the risks of …

Truth or dare: quantitative security risk analysis via attack trees

R Kumar - 2018 - research.utwente.nl
Cyber breaches have grown exponentially over the years, both in the number of incidents
and in damage. Examples of such damaging attacks are numerous, with WannaCry …

Restart-based security mechanisms for safety-critical embedded systems

F Abdi, CY Chen, M Hasan, S Liu, S Mohan… - arXiv preprint arXiv …, 2017 - arxiv.org
Many physical plants that are controlled by embedded systems have safety requirements
that need to be respected at all times-any deviations from expected behavior can result in …

LOCKS: a property specification language for security goals

R Kumar, A Rensink, M Stoelinga - Proceedings of the 33rd Annual ACM …, 2018 - dl.acm.org
We introduce a formal specification language LOCKS, that allow security practitioners to
express as well as compose security goals in a convenient manner. LOCKS supports the …

[PDF][PDF] PALM: A framework to identify novel attacks in an e-commerce system

R Kumar, S Pandey, D Das - researchgate.net
The widespread adoption of e-commerce and its lucrative, decentralized, multi-agent nature
have made these systems vulnerable to cyber-attacks. Traditional signature-based …

[PDF][PDF] State Space Reductions for Multi-agent Systems

T Sidoruk - bip.pw.edu.pl
Abstract The Ph. D. thesis “State Space Reductions for Multi-agent Systems”, written under
the supervision of Prof. Wojciech Penczek, discusses several approaches to mitigating the …

On the theory and practice of updatable parametric timed automata

M Ramparison - 2019 - theses.hal.science
As cyber-physical systems become more and more complex, human debugging is not
sufficient anymore to cover the huge range of possible behaviours. For costly critical systems …