The Cyber-Physical Attacker

Roberto Vigo

    Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

    Abstract

    The world of Cyber-Physical Systems ranges from industrial to national interest applications. Even though these systems are pervading our everyday life, we are still far from fully understanding their security properties. Devising a suitable attacker model is a crucial element when studying the security properties of CPSs, as a system cannot be secured without defining the threats it is subject to. In this work an attacker scenario is presented which addresses the peculiarities of a cyber-physical adversary, and we discuss how this scenario relates to other attacker models popular in the security protocol literature.
    Original languageEnglish
    Title of host publicationComputer Safety, Reliability, and Security : SAFECOMP 2012 Workshops: Sassur, ASCoMS, DESEC4LCCI, ERCIM/EWICS, IWDE Magdeburg, Germany, September 25-28, 2012 Proceedings
    PublisherSpringer
    Publication date2012
    Pages347-356
    ISBN (Print)978-3-642-33674-4
    ISBN (Electronic)978-3-642-33675-1
    DOIs
    Publication statusPublished - 2012
    Event31st International Conference on Computer Safety, Reliability and Security (SAFECOMP) - Herrenkrug Parkhotel, Magdeburg, Germany
    Duration: 25 Sept 201228 Sept 2012
    http://www-e.uni-magdeburg.de/safecomp/

    Conference

    Conference31st International Conference on Computer Safety, Reliability and Security (SAFECOMP)
    LocationHerrenkrug Parkhotel
    Country/TerritoryGermany
    CityMagdeburg
    Period25/09/201228/09/2012
    Internet address
    SeriesLecture Notes in Computer Science
    Volume7613
    ISSN0302-9743

    Keywords

    • Attacker model
    • Cyber-physical threats
    • Cyber-physical systems
    • Security protocol verification

    Fingerprint

    Dive into the research topics of 'The Cyber-Physical Attacker'. Together they form a unique fingerprint.

    Cite this