TY - GEN
T1 - Towards resilient cyber-physical control systems
AU - Salles-Loustau, Gabriel
AU - Zonouz, Saman
N1 - Publisher Copyright:
© 2015 IEEE.
PY - 2016/2/23
Y1 - 2016/2/23
N2 - Cyber-Physical Systems (CPS) are yielding novel problems and solutions for security researchers. CPSs connect computerized controllers and human supervisors with physical systems used in the energy, transportation, water, manufacturing, and other sectors. Recent attacks against CPS have prompted unprecedented investigation into new threats and mitigations against CPSs. There are motivating examples of real-world control system attacks such as the Maroochy Shire water system attack, the Lodz Poland train derailment, and the Stuxnet virus. In each of these attacks, the adversary capabilities and objectives, vulnerabilities, attack methods, and final outcomes differ significantly. However, despite the increased interest in CPS security problems, the security community faces significant learning curves in addressing them. Modern CPSs are founded on control theory, real-time systems, and obscure, often ad-hoc programming practices. Furthermore, the traditional definitions of security are often in conflict with the goals and operational constraints of CPSs. A security measure that blocks a system operator from executing a critical action could cause as much or more damage than an actual attack. We discuss the most basic and widely deployed application of CPS, control systems, and the emerging problems in their security.
AB - Cyber-Physical Systems (CPS) are yielding novel problems and solutions for security researchers. CPSs connect computerized controllers and human supervisors with physical systems used in the energy, transportation, water, manufacturing, and other sectors. Recent attacks against CPS have prompted unprecedented investigation into new threats and mitigations against CPSs. There are motivating examples of real-world control system attacks such as the Maroochy Shire water system attack, the Lodz Poland train derailment, and the Stuxnet virus. In each of these attacks, the adversary capabilities and objectives, vulnerabilities, attack methods, and final outcomes differ significantly. However, despite the increased interest in CPS security problems, the security community faces significant learning curves in addressing them. Modern CPSs are founded on control theory, real-time systems, and obscure, often ad-hoc programming practices. Furthermore, the traditional definitions of security are often in conflict with the goals and operational constraints of CPSs. A security measure that blocks a system operator from executing a critical action could cause as much or more damage than an actual attack. We discuss the most basic and widely deployed application of CPS, control systems, and the emerging problems in their security.
UR - http://www.scopus.com/inward/record.url?scp=84964727037&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84964727037&partnerID=8YFLogxK
U2 - 10.1109/GlobalSIP.2015.7418279
DO - 10.1109/GlobalSIP.2015.7418279
M3 - Conference contribution
AN - SCOPUS:84964727037
T3 - 2015 IEEE Global Conference on Signal and Information Processing, GlobalSIP 2015
SP - 662
EP - 666
BT - 2015 IEEE Global Conference on Signal and Information Processing, GlobalSIP 2015
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - IEEE Global Conference on Signal and Information Processing, GlobalSIP 2015
Y2 - 13 December 2015 through 16 December 2015
ER -