A survey of cyber attacks on cyber physical systems: Recent advances and challenges

W Duo, MC Zhou, A Abusorrah - IEEE/CAA Journal of …, 2022 - ieeexplore.ieee.org
A cyber physical system (CPS) is a complex system that integrates sensing, computation,
control and networking into physical processes and objects over Internet. It plays a key role …

On the history of diagnosability and opacity in discrete event systems

S Lafortune, F Lin, CN Hadjicostis - Annual Reviews in Control, 2018 - Elsevier
This paper presents historical remarks on key projects and papers that led to the
development of a theory of event diagnosis for discrete event systems modeled by finite …

Verification of state-based opacity using Petri nets

Y Tong, Z Li, C Seatzu, A Giua - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
A system is said to be opaque if a given secret behavior remains opaque (uncertain) to an
intruder who can partially observe system activities. This work addresses the verification of …

Supervisor synthesis to thwart cyber attack with bounded sensor reading alterations

R Su - Automatica, 2018 - Elsevier
One of the major challenges about cyber–physical systems is how to protect system integrity
from cyber attacks. There has been a large number of different types of attacks discussed in …

Secure-by-construction synthesis of cyber-physical systems

S Liu, A Trivedi, X Yin, M Zamani - Annual Reviews in Control, 2022 - Elsevier
Correct-by-construction synthesis is a cornerstone of the confluence of formal methods and
control theory towards designing safety-critical systems. Instead of following the time-tested …

Analysis and control for resilience of discrete event systems: Fault diagnosis, opacity and cyber security

JC Basilio, CN Hadjicostis, R Su - Foundations and Trends® …, 2021 - nowpublishers.com
Abstract System resilience captures the ability of the system to withstand a major disruption
within acceptable performance degradation and to recover within an acceptable time frame …

A new approach for the verification of infinite-step and K-step opacity using two-way observers

X Yin, S Lafortune - Automatica, 2017 - Elsevier
In the context of security analysis for information flow properties, where a potentially
malicious observer (intruder) tracks the observed behavior of a given system, infinite-step …

A classification of cybersecurity strategies in the context of discrete event systems

S Oliveira, AB Leal, M Teixeira, YK Lopes - Annual reviews in Control, 2023 - Elsevier
In recent years, cybersecurity has received increasing attention due to the demand from a
large class of networked systems for resilience against cyberattacks that may compromise …

Security of cyber-physical systems: Design of a security supervisor to thwart attacks

PM Lima, MVS Alves, LK Carvalho… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Cyber-physical systems (CPSs) integrate computing and communication capabilities to
monitor and control physical processes. In order to do so, communication networks are …

Ensuring confidentiality of cyber-physical systems using event-based cryptography

PM Lima, LK Carvalho, MV Moreira - Information Sciences, 2023 - Elsevier
One of the most important challenges for the application of cyber-physical systems (CPS) in
smart industries is ensuring its security against cyber attacks. In this paper, we consider that …