[go: up one dir, main page]

skip to main content
10.1145/2897035.2897041acmconferencesArticle/Chapter ViewAbstractPublication PagesicseConference Proceedingsconference-collections
research-article

Model-based security analysis of a water treatment system

Published: 14 May 2016 Publication History

Abstract

An approach to analyzing the security of a cyber-physical system (CPS) is proposed, where the behavior of a physical plant and its controller are captured in approximate models, and their interaction is rigorously checked to discover potential attacks that involve a varying number of compromised sensors and actuators. As a preliminary study, this approach has been applied to a fully functional water treatment testbed constructed at the Singapore University of Technology and Design. The analysis revealed previously unknown attacks that were confirmed to pose serious threats to the safety of the testbed, and suggests a number of research challenges and opportunities for applying a similar type of formal analysis to cyber-physical security.

References

[1]
SWaT: Secure Water Treatment Testbed, 2015. https://itrust.sutd.edu.sg/wp-content/uploads/sites/3/2015/11/Brief-Introduction-to-SWaT_181115.pdf.
[2]
Alloy language and analyzer. http://alloy.mit.edu.
[3]
Daniel Jackson. Software Abstractions: logic, language, and analysis. MIT Press, Second edition, 2012.
[4]
Emina Torlak and Daniel Jackson. Kodkod: A relational model finder. In Tools and Algorithms for the Construction and Analysis of Systems TACAS Portugal, 2007., pages 632--647, 2007.
[5]
Patrick Cousot and Radhia Cousot. Abstract interpretation: a unified lattice model for static analysis of programs by construction or approximation of fixpoints. In Proceedings of the 4th ACM SIGACT-SIGPLAN symposium on Principles of programming languages, pages 238--252. ACM, 1977.
[6]
David. Urbina, Jairo. Giraldo, Nils Ole. Tippenhauer, and Alvaro Cardenas. Attacking fieldbus communications in ics: Applications to the swat testbed. In Proc. Singapore Cyber-Security Conference (SG-CRC), pages 75--89, 2016.
[7]
André Platzer. Logical analysis of hybrid systems: proving theorems for complex dynamics. Springer Science & Business Media, 2010.
[8]
Sicun Gao, Soonho Kong, and Edmund M Clarke. dreal: An SMT solver for nonlinear theories over the reals. In Automated Deduction--CADE-24, pages 208--214. Springer, 2013.
[9]
Alessandro Cimatti, Sergio Mover, and Stefano Tonetta. SMT-based verification of hybrid systems. In AAAI, 2012.
[10]
Mathworks. Matlab. http://www.mathworks.com/products/matlab/.
[11]
Mathworks. Simulink. http://www.mathworks.com/products/simulink/.
[12]
Ravi Akella and Bruce M McMillin. Model-checking bndc properties in cyber-physical systems. In Computer Software and Applications Conference, 2009. COMPSAC'09. 33rd Annual IEEE International, volume 1, pages 660--663. IEEE, 2009.
[13]
Chih-Hong Cheng, Natarajan Shankar, Harald Ruess, and Saddek Bensalem. EFSMT: A logical framework for cyber-physical systems. arXiv preprint arXiv:1306.3456, 2013.
[14]
Edmund M Clarke and Paolo Zuliani. Statistical model checking for cyber-physical systems. In Automated Technology for Verification and Analysis, pages 1--12. Springer, 2011.
[15]
Dean H Stamatis. Failure mode and effect analysis: FMEA from theory to execution. ASQ Quality Press, 2003.
[16]
William E Vesely, Francine F Goldberg, Norman H Roberts, and David F Haasl. Fault tree handbook. Technical report, DTIC Document, 1981.
[17]
X. Zheng, C. Julien, M. Kim, and S. Khurshid. Perceptions on the state of the art in verification and validation in cyber-physical systems. Systems Journal, IEEE, PP(99):1--14, 2015.
[18]
Sridhar Adepu, Aditya Mathur, Jagadeesh Gunda, and Sasa Djokic. An agent-based framework for simulating and analysing attacks on cyber physical systems. In Algorithms and Architectures for Parallel Processing, pages 785--798. Springer, 2015.
[19]
S. Adepu and A. Mathur. An investigation into the response of a water treatment system to cyber attacks. In Proceedings of the 17th IEEE High Assurance Systems Engineering Symposium, Orlando, January 2016.

Cited By

View all
  • (2024)A Game-Theoretical Self-Adaptation Framework for Securing Software-Intensive SystemsACM Transactions on Autonomous and Adaptive Systems10.1145/365294919:2(1-49)Online publication date: 20-Apr-2024
  • (2024)CRYSTAL Framework: Cybersecurity Assurance for Cyber-Physical SystemsJournal of Logical and Algebraic Methods in Programming10.1016/j.jlamp.2024.100965(100965)Online publication date: Mar-2024
  • (2023)Formal modeling and analysis of security schemes of RPL protocol using colored Petri netsPLOS ONE10.1371/journal.pone.028570018:8(e0285700)Online publication date: 17-Aug-2023
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
SEsCPS '16: Proceedings of the 2nd International Workshop on Software Engineering for Smart Cyber-Physical Systems
May 2016
71 pages
ISBN:9781450341714
DOI:10.1145/2897035
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 14 May 2016

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. attack generation
  2. cyber-physical system
  3. model checking
  4. security

Qualifiers

  • Research-article

Conference

ICSE '16
Sponsor:

Upcoming Conference

ICSE 2025

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)32
  • Downloads (Last 6 weeks)2
Reflects downloads up to 16 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2024)A Game-Theoretical Self-Adaptation Framework for Securing Software-Intensive SystemsACM Transactions on Autonomous and Adaptive Systems10.1145/365294919:2(1-49)Online publication date: 20-Apr-2024
  • (2024)CRYSTAL Framework: Cybersecurity Assurance for Cyber-Physical SystemsJournal of Logical and Algebraic Methods in Programming10.1016/j.jlamp.2024.100965(100965)Online publication date: Mar-2024
  • (2023)Formal modeling and analysis of security schemes of RPL protocol using colored Petri netsPLOS ONE10.1371/journal.pone.028570018:8(e0285700)Online publication date: 17-Aug-2023
  • (2023)Constructing Cyber-Physical System Testing Suites Using Active Sensor FuzzingIEEE Transactions on Software Engineering10.1109/TSE.2023.330933049:11(4829-4845)Online publication date: Nov-2023
  • (2023)AI for Cyberbiosecurity in Water Systems—A SurveyCyberbiosecurity10.1007/978-3-031-26034-6_13(217-263)Online publication date: 11-Jan-2023
  • (2022)Modeling Cyberattack Propagation and Impacts on Cyber-Physical System Safety: An ExperimentElectronics10.3390/electronics1201007712:1(77)Online publication date: 25-Dec-2022
  • (2022)Study Cybersecurity of Cyber Physical System in the Virtual Environment: A Survey and New DirectionProceedings of the 2022 Australasian Computer Science Week10.1145/3511616.3513098(46-55)Online publication date: 14-Feb-2022
  • (2022)Cyberattacks: Modeling, Analysis, and Mitigation2022 6th International Conference on Computer, Software and Modeling (ICCSM)10.1109/ICCSM57214.2022.00021(80-84)Online publication date: Jul-2022
  • (2022)Dash: declarative behavioural modelling in Alloy with control state hierarchySoftware and Systems Modeling10.1007/s10270-022-01012-122:2(733-749)Online publication date: 6-Aug-2022
  • (2022)Runtime Verification of Correct-by-Construction Driving ManeuversLeveraging Applications of Formal Methods, Verification and Validation. Verification Principles10.1007/978-3-031-19849-6_15(242-263)Online publication date: 17-Oct-2022
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media