Security Games for Cyber-Physical Systems

Roberto Vigo, Alessandro Bruni, Ender Yuksel

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

Abstract

The development of quantitative security analyses that consider both active attackers and reactive defenders is a main challenge in the design of trustworthy Cyber-Physical Systems. We propose a game-theoretic approach where it is natural to model attacker’s and defender’s actions explicitly, associating costs to attacks and countermeasures. Cost considerations enable to contrast different strategies on the basis of their effectiveness and efficiency, paving the way to a multi-objective notion of optimality. Moreover, the framework allows expressing the probabilistic nature of the environment and of the attack detection process. Finally, a solver is presented to compute strategies and their costs, resorting to a recent combination of strategy iteration with linear programming.
Original languageEnglish
Title of host publicationSecure IT Systems : 18th Nordic Conference, NordSec 2013, Ilulissat, Greenland, October 18-21, 2013, Proceedings
PublisherSpringer
Publication date2013
Pages17-32
ISBN (Print)978-3-642-41487-9
ISBN (Electronic)978-3-642-41488-6
DOIs
Publication statusPublished - 2013
Event18th Nordic Conference on Secure IT Systems (NordSec 2013) - Ilulissat, Greenland
Duration: 18 Oct 201321 Oct 2013
http://nordsec2013.imm.dtu.dk/

Conference

Conference18th Nordic Conference on Secure IT Systems (NordSec 2013)
Country/TerritoryGreenland
CityIlulissat
Period18/10/201321/10/2013
Internet address
SeriesLecture Notes in Computer Science
Volume8208
ISSN0302-9743

Fingerprint

Dive into the research topics of 'Security Games for Cyber-Physical Systems'. Together they form a unique fingerprint.

Cite this