Security Games for Cyber-Physical Systems

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedings – Annual report year: 2013Researchpeer-review

View graph of relations

The development of quantitative security analyses that consider both active attackers and reactive defenders is a main challenge in the design of trustworthy Cyber-Physical Systems. We propose a game-theoretic approach where it is natural to model attacker’s and defender’s actions explicitly, associating costs to attacks and countermeasures. Cost considerations enable to contrast different strategies on the basis of their effectiveness and efficiency, paving the way to a multi-objective notion of optimality. Moreover, the framework allows expressing the probabilistic nature of the environment and of the attack detection process. Finally, a solver is presented to compute strategies and their costs, resorting to a recent combination of strategy iteration with linear programming.
Original languageEnglish
Title of host publicationSecure IT Systems : 18th Nordic Conference, NordSec 2013, Ilulissat, Greenland, October 18-21, 2013, Proceedings
PublisherSpringer
Publication date2013
Pages17-32
ISBN (Print)978-3-642-41487-9
ISBN (Electronic)978-3-642-41488-6
DOIs
Publication statusPublished - 2013
Event18th Nordic Conference on Secure IT Systems (NordSec 2013) - Ilulissat, Greenland
Duration: 18 Oct 201321 Oct 2013
http://nordsec2013.imm.dtu.dk/

Conference

Conference18th Nordic Conference on Secure IT Systems (NordSec 2013)
CountryGreenland
CityIlulissat
Period18/10/201321/10/2013
Internet address
SeriesLecture Notes in Computer Science
Volume8208
ISSN0302-9743
CitationsWeb of Science® Times Cited: No match on DOI
Download as:
Download as PDF
Select render style:
APAAuthorCBE/CSEHarvardMLAStandardVancouverShortLong
PDF
Download as HTML
Select render style:
APAAuthorCBE/CSEHarvardMLAStandardVancouverShortLong
HTML
Download as Word
Select render style:
APAAuthorCBE/CSEHarvardMLAStandardVancouverShortLong
Word

ID: 64420139