Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3575870.3587118acmconferencesArticle/Chapter ViewAbstractPublication PagescpsweekConference Proceedingsconference-collections
research-article

Quantitative Robustness Analysis of Sensor Attacks on Cyber-Physical Systems

Published: 09 May 2023 Publication History

Abstract

This paper contributes a formal framework for quantitative analysis of bounded sensor attacks on cyber-physical systems, using the formalism of differential dynamic logic. Given a precondition and postcondition of a system, we formalize two quantitative safety notions, quantitative forward and backward safety, which respectively express (1) how strong the strongest postcondition of the system is with respect to the specified postcondition, and (2) how strong the specified precondition is with respect to the weakest precondition of the system needed to ensure the specified postcondition holds. We introduce two notions, forward and backward robustness, to characterize the robustness of a system against sensor attacks as the loss of safety. Two simulation distances, which respectively characterize upper bounds of the degree of forward and backward safety loss caused by the sensor attacks, are developed to reason with robustness. We verify the two simulation distances by expressing them as formulas of differential dynamic logic. We showcase an example of an autonomous vehicle that needs to avoid a collision.

References

[1]
Andrei A Agrachev, A Stephen Morse, Eduardo D Sontag, Héctor J Sussmann, Vadim I Utkin, and Eduardo D Sontag. 2008. Input to state stability: Basic concepts and results. Nonlinear and optimal control theory: lectures given at the CIME summer school held in Cetraro, Italy June 19–29, 2004 (2008), 163–220.
[2]
Rajeev Alur. 2015. Principles of cyber-physical systems. MIT Press.
[3]
Aaron D Ames, Xiangru Xu, Jessy W Grizzle, and Paulo Tabuada. 2016. Control barrier function based quadratic programs for safety critical systems. IEEE Trans. Automat. Control 62, 8 (2016), 3861–3876.
[4]
Martín Barrère, Chris Hankin, Nicolas Nicolaou, Demetrios G. Eliades, and Thomas Parisini. 2020. Measuring cyber-physical security in industrial control systems via minimum-effort attack strategies. J. Inf. Secur. Appl. 52 (2020), 102471.
[5]
Cinzia Bernardeschi, Andrea Domenici, and Maurizio Palmieri. 2020. Formalization and co-simulation of attacks on cyber-physical systems. Journal of Computer Virology and Hacking Techniques 16, 1 (2020), 63–77.
[6]
Stephen Boyd, Stephen P Boyd, and Lieven Vandenberghe. 2004. Convex optimization. Cambridge university press.
[7]
Davide Bresolin, Pieter Collins, Luca Geretti, Roberto Segala, Tiziano Villa, and Sanja Zivanovic Gonzalez. 2020. A computable and compositional semantics for hybrid automata. In HSCC. ACM, 18:1–18:11.
[8]
Yulong Cao, Chaowei Xiao, Benjamin Cyr, Yimeng Zhou, Won Park, Sara Rampazzi, Qi Alfred Chen, Kevin Fu, and Z Morley Mao. 2019. Adversarial sensor attack on LiDAR-based perception in autonomous driving. In CCS. 2267–2281.
[9]
Drew Davidson, Hao Wu, Rob Jellinek, Vikas Singh, and Thomas Ristenpart. 2016. Controlling UAVs with sensor input spoofing attacks. In WOOT.
[10]
Georgios E Fainekos and George J Pappas. 2009. Robustness of temporal logic specifications for continuous-time signals. Theoretical Computer Science 410, 42 (2009), 4262–4291.
[11]
Thomas Ferrère, Dejan Nickovic, Alexandre Donzé, Hisahiro Ito, and James Kapinski. 2019. Interface-aware signal temporal logic. In HSCC. ACM, 57–66.
[12]
Simon Foster, Jonathan Julián Huerta y Munive, Mario Gleirscher, and Georg Struth. 2021. Hybrid Systems Verification with Isabelle/HOL: Simpler Syntax, Better Models, Faster Proofs. In FM(LNCS, Vol. 13047). Springer, 367–386.
[13]
Martin Fränzle, James Kapinski, and Pavithra Prabhakar. 2016. Robustness in Cyber-Physical Systems. Dagstuhl Reports 6, 9 (2016), 29–45.
[14]
Nathan Fulton, Stefan Mitsch, Jan-David Quesel, Marcus Völp, and André Platzer. 2015. KeYmaera X: An axiomatic tactical theorem prover for hybrid systems. In CADE(LNCS, Vol. 9195). Springer, 527–538.
[15]
Alessandro Giacalone, Chi-Chang Jou, and Scott A. Smolka. 1990. Algebraic Reasoning for Probabilistic Concurrent Systems. In Programming concepts and methods: Proceedings of the IFIP Working Group 2.2, 2.3 Working Conference on Programming Concepts and Methods, Sea of Galilee, Israel, 2-5 April, 1990, Manfred Broy and Cliff B. Jones (Eds.). North-Holland, 443–458.
[16]
J. Giraldo, D. I. Urbina, A. Cardenas, J. Valente, M. Faisal, J. Ruths, N. O. Tippenhauer, H. Sandberg, and R. Candell. 2018. A Survey of Physics-Based Attack Detection in Cyber-Physical Systems. ACM Comput. Surv. 51, 4 (2018), 76:1–76:36.
[17]
David Harel, Dexter Kozen, and Jerzy Tiuryn. 2000. Dynamic Logic. MIT Press.
[18]
Fei Hu, Yu Lu, Athanasios V. Vasilakos, Qi Hao, Rui Ma, Yogendra Patil, Ting Zhang, Jiang Lu, Xin Li, and Neal N. Xiong. 2016. Robust Cyber-Physical Systems: concept, models, and Implementation. Future Gener. Comput. Syst. 56 (2016), 449–475.
[19]
K. Huang, C. Zhou, Y. Tian, S. Yang, and Y. Qin. 2018. Assessing the Physical Impact of Cyberattacks on Industrial Cyber-Physical Systems. IEEE Trans. Industrial Electronics 65, 10 (2018), 8153–8162.
[20]
Jonathan Julián Huerta y Munive and Georg Struth. 2022. Predicate Transformer Semantics for Hybrid Systems. Journal of Automated Reasoning 66, 1 (2022), 93–139.
[21]
I. Jahandideh, F. Ghassemi, and M. Sirjani. 2021. An actor-based framework for asynchronous event-based cyber-physical systems. Software and Systems Modeling 20 (2021), 641–665. Issue 3.
[22]
Dexter Kozen. 1997. Kleene algebra with tests. TOPLAS 19, 3 (1997), 427–443.
[23]
M. Krotofil and A. A. Cárdenas. 2013. Resilience of Process Control Systems to Cyber-Physical Attacks. In NordSec(LNCS, Vol. 8208). Springer, 166–182.
[24]
R. Lanotte, M. Merro, A. Munteanu, and S. Tini. 2021. Formal Impact Metrics for Cyber-physical Attacks. In CSF. IEEE, 1–16.
[25]
Ruggero Lanotte, Massimo Merro, Andrei Munteanu, and Luca Viganò. 2020. A Formal Approach to Physics-based Attacks in Cyber-physical Systems. ACM Transactions on Privacy and Security 23, 1 (2020), 3:1–3:41.
[26]
Ruggero Lanotte, Massimo Merro, Riccardo Muradore, and Luca Viganò. 2017. A formal approach to cyber-physical attacks. In CSF. IEEE, 436–450.
[27]
R. Lanotte, M. Merro, and S. Tini. 2018. Towards a Formal Notion of Impact Metric for Cyber-Physical Attacks. In IFM(LNCS, Vol. 11023). Springer, 296–315.
[28]
Kim Guldstrand Larsen. 2009. Verification and performance analysis for embedded systems. In TASE. IEEE, 3–4.
[29]
Edward Ashford Lee and Sanjit A Seshia. 2016. Introduction to embedded systems: A cyber-physical systems approach. MIT press.
[30]
Oded Maler and Dejan Nickovic. 2004. Monitoring Temporal Properties of Continuous Signals. In FORMATS/FTRTFT(LNCS, Vol. 3253). 152–166.
[31]
Sara Mohammadinejad, Jyotirmoy V Deshmukh, and Aniruddh G Puranic. 2020. Mining environment assumptions for cyber-physical system models. In ICCPS. IEEE, 87–97.
[32]
Vivek Nigam, Carolyn Talcott, and A.A. Urquiza. 2016. Towards the Automated Verification of Cyber-Physical Security Protocols: Bounding the Number of Timed Intruders. In ESORICS(LNCS, Vol. 9879). Springer, 450–470.
[33]
V. Nigam and C. L. Talcott. 2019. Formal Security Verification of Industry 4.0 Applications. In ETFA. IEEE, 1043–1050.
[34]
Sam Owre, John M Rushby, and Natarajan Shankar. 1992. PVS: A prototype verification system. In CADE(LNCS, Vol. 607). Springer, 748–752.
[35]
André Platzer. 2008. Differential dynamic logic for hybrid systems. Journal of Automated Reasoning 41, 2 (2008), 143–189.
[36]
André Platzer. 2017. A complete uniform substitution calculus for differential dynamic logic. Journal of Automated Reasoning 59, 2 (2017), 219–265.
[37]
André Platzer. 2018. Logical foundations of cyber-physical systems. Vol. 662. Springer.
[38]
Matthias Rungger and Paulo Tabuada. 2016. A Notion of Robustness for Cyber-Physical Systems. IEEE Trans. Autom. Control. 61, 8 (2016), 2108–2123.
[39]
Yunmok Son, Hocheol Shin, Dongkwan Kim, Youngseok Park, Juhwan Noh, Kibum Choi, Jungwoo Choi, and Yongdae Kim. 2015. Rocking drones with intentional sound noise on gyroscopic sensors. In USENIX Security. 881–896.
[40]
Paulo Tabuada. 2009. Verification and control of hybrid systems: a symbolic approach. Springer.
[41]
Paulo Tabuada, Sina Yamac Caliskan, Matthias Rungger, and Rupak Majumdar. 2014. Towards Robustness for Cyber-Physical Systems. IEEE Trans. Autom. Control. 59, 12 (2014), 3151–3163.
[42]
Ashish Tiwari. 2011. Logic in software, dynamical and biological systems. In LICS. IEEE, 9–10.
[43]
Jian Xiang, Nathan Fulton, and Stephen Chong. 2021. Relational Analysis of Sensor Attacks on Cyber-Physical Systems. In CSF. IEEE, 1–16.

Cited By

View all
  • (2024)Robustness for biochemical networksTheoretical Computer Science10.1016/j.tcs.2024.1149341022:COnline publication date: 29-Dec-2024
  • (2023)Stark: A Software Tool for the Analysis of Robustness in the unKnown EnvironmentCoordination Models and Languages10.1007/978-3-031-35361-1_6(115-132)Online publication date: 19-Jun-2023

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
HSCC '23: Proceedings of the 26th ACM International Conference on Hybrid Systems: Computation and Control
May 2023
239 pages
ISBN:9798400700330
DOI:10.1145/3575870
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 09 May 2023

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. differential dynamic logic
  2. formal method
  3. quantitative analysis
  4. robustness

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Conference

HSCC '23
Sponsor:

Acceptance Rates

Overall Acceptance Rate 153 of 373 submissions, 41%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)43
  • Downloads (Last 6 weeks)2
Reflects downloads up to 07 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2024)Robustness for biochemical networksTheoretical Computer Science10.1016/j.tcs.2024.1149341022:COnline publication date: 29-Dec-2024
  • (2023)Stark: A Software Tool for the Analysis of Robustness in the unKnown EnvironmentCoordination Models and Languages10.1007/978-3-031-35361-1_6(115-132)Online publication date: 19-Jun-2023

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format.

HTML Format

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media