Design-time quantification of integrity in cyber-physical systems

Eric Rothstein Morris, C.G. Murguia Rendon, Martin Ochoa

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademic

5 Citations (Scopus)

Abstract

In a software system it is possible to quantify the amount of information that is leaked or corrupted by analysing the flows of information present in the source code. In a cyber-physical system, information flows are not only present at the digital level but also at a physical level, and they are also present to and fro the two levels. In this work, we provide a methodology to formally analyse a composite, cyber-physical system model (combining physics and control) using an information flow-theoretic approach. We use this approach to quantify the level of vulnerability of a system with respect to attackers with different capabilities. We illustrate our approach by means of a water distribution case study.
Original languageEnglish
Title of host publicationPLAS 2017 - Proceedings of the 2017 Workshop on Programming Languages and Analysis for Security, co-located with CCS 2017
Place of PublicationNew York
PublisherAssociation for Computing Machinery, Inc
Pages63–74
Number of pages12
ISBN (Electronic)9781450350990
DOIs
Publication statusPublished - 1 Oct 2017
Externally publishedYes
EventPLAS '17: Workshop on Programming Languages and Analysis for Security - Dallas, United States
Duration: 30 Oct 201730 Oct 2017

Conference

ConferencePLAS '17: Workshop on Programming Languages and Analysis for Security
CountryUnited States
CityDallas
Period30/10/1730/10/17

Keywords

  • Control theory
  • Cyber-physical systems
  • Information flow
  • Noninterference

Fingerprint Dive into the research topics of 'Design-time quantification of integrity in cyber-physical systems'. Together they form a unique fingerprint.

  • Cite this

    Morris, E. R., Murguia Rendon, C. G., & Ochoa, M. (2017). Design-time quantification of integrity in cyber-physical systems. In PLAS 2017 - Proceedings of the 2017 Workshop on Programming Languages and Analysis for Security, co-located with CCS 2017 (pp. 63–74). Association for Computing Machinery, Inc. https://doi.org/10.1145/3139337.3139347