信息物理系统
隐蔽的
图层(电子)
计算机安全
计算机科学
物理层
应用层
计算机网络
操作系统
材料科学
纳米技术
软件
语言学
哲学
无线
作者
Yitong Li,Lidong He,Xiaoling Wang
标识
DOI:10.1016/j.jfranklin.2024.106887
摘要
In this paper, we investigate the problem of command attacker synthesis in cyber–physical systems at the supervisory control layer. The attacker attempts to inflict damage or reach a blocking state, while undetected by the supervisor. Specially, we propose the so-called Command Attack Structure (CAS) to capture attack processes and describe the interaction between the attacker and the supervisory control system. To address the races between attack events and commands or internal events of the control system during the interaction, we propose the conditions of strictly race-free and loosely race-free, which the attacker must adhere to. Moreover, we design pruning algorithms to achieve covert and race-free CASs, and ultimately obtain successful command attackers. Lastly, we also consider combined attacks, which involve multiple attack operations on a single command. Then the combined CAS is designed to model and analyze such scenarios.
科研通智能强力驱动
Strongly Powered by AbleSci AI