Abstract
The world of Cyber-Physical Systems ranges from industrial to national interest applications. Even though these systems are pervading our everyday life, we are still far from fully understanding their security properties. Devising a suitable attacker model is a crucial element when studying the security properties of CPSs, as a system cannot be secured without defining the threats it is subject to. In this work an attacker scenario is presented which addresses the peculiarities of a cyber-physical adversary, and we discuss how this scenario relates to other attacker models popular in the security protocol literature.
Original language | English |
---|---|
Title of host publication | Computer Safety, Reliability, and Security : SAFECOMP 2012 Workshops: Sassur, ASCoMS, DESEC4LCCI, ERCIM/EWICS, IWDE Magdeburg, Germany, September 25-28, 2012 Proceedings |
Publisher | Springer |
Publication date | 2012 |
Pages | 347-356 |
ISBN (Print) | 978-3-642-33674-4 |
ISBN (Electronic) | 978-3-642-33675-1 |
DOIs | |
Publication status | Published - 2012 |
Event | 31st International Conference on Computer Safety, Reliability and Security (SAFECOMP) - Herrenkrug Parkhotel, Magdeburg, Germany Duration: 25 Sept 2012 → 28 Sept 2012 http://www-e.uni-magdeburg.de/safecomp/ |
Conference
Conference | 31st International Conference on Computer Safety, Reliability and Security (SAFECOMP) |
---|---|
Location | Herrenkrug Parkhotel |
Country/Territory | Germany |
City | Magdeburg |
Period | 25/09/2012 → 28/09/2012 |
Internet address |
Series | Lecture Notes in Computer Science |
---|---|
Volume | 7613 |
ISSN | 0302-9743 |
Keywords
- Attacker model
- Cyber-physical threats
- Cyber-physical systems
- Security protocol verification