Guaranteed physical security with restart-based design for cyber-physical systems
Physical plants that form the core of the Cyber-Physical Systems (CPS) often have stringent
safety requirements. Recent attacks have shown that cyber intrusions can result in the safety …
safety requirements. Recent attacks have shown that cyber intrusions can result in the safety …
[PDF][PDF] Effective analysis of attack trees: A model-driven approach
Attack trees (ATs) are a popular formalism for security analysis, and numerous variations
and tools have been developed around them. These were mostly developed independently …
and tools have been developed around them. These were mostly developed independently …
Parametric analyses of attack-fault trees
Risk assessment of cyber-physical systems, such as power plants, connected devices and IT-
infrastructures has always been challenging: safety (ie, absence of unintentional failures) …
infrastructures has always been challenging: safety (ie, absence of unintentional failures) …
Generation of cyberattacks leading to safety top event using altarica: an automotive case study
T Serru, N Nguyen, M Batteux, A Rauzy… - 23e Congrès de …, 2022 - hal.science
Cyber-Physical Systems (CPS) are safety critical as they can be at risk for their users and
environment. It is thus paramount to assess all risks related to their use, including the risks of …
environment. It is thus paramount to assess all risks related to their use, including the risks of …
Truth or dare: quantitative security risk analysis via attack trees
R Kumar - 2018 - research.utwente.nl
Cyber breaches have grown exponentially over the years, both in the number of incidents
and in damage. Examples of such damaging attacks are numerous, with WannaCry …
and in damage. Examples of such damaging attacks are numerous, with WannaCry …
Restart-based security mechanisms for safety-critical embedded systems
Many physical plants that are controlled by embedded systems have safety requirements
that need to be respected at all times-any deviations from expected behavior can result in …
that need to be respected at all times-any deviations from expected behavior can result in …
LOCKS: a property specification language for security goals
We introduce a formal specification language LOCKS, that allow security practitioners to
express as well as compose security goals in a convenient manner. LOCKS supports the …
express as well as compose security goals in a convenient manner. LOCKS supports the …
[PDF][PDF] PALM: A framework to identify novel attacks in an e-commerce system
The widespread adoption of e-commerce and its lucrative, decentralized, multi-agent nature
have made these systems vulnerable to cyber-attacks. Traditional signature-based …
have made these systems vulnerable to cyber-attacks. Traditional signature-based …
[PDF][PDF] State Space Reductions for Multi-agent Systems
T Sidoruk - bip.pw.edu.pl
Abstract The Ph. D. thesis “State Space Reductions for Multi-agent Systems”, written under
the supervision of Prof. Wojciech Penczek, discusses several approaches to mitigating the …
the supervision of Prof. Wojciech Penczek, discusses several approaches to mitigating the …
On the theory and practice of updatable parametric timed automata
M Ramparison - 2019 - theses.hal.science
As cyber-physical systems become more and more complex, human debugging is not
sufficient anymore to cover the huge range of possible behaviours. For costly critical systems …
sufficient anymore to cover the huge range of possible behaviours. For costly critical systems …