Abstract
The world of Cyber-Physical Systems ranges from industrial to national interest applications. Even though these systems are pervading our everyday life, we are still far from fully understanding their security properties. Devising a suitable attacker model is a crucial element when studying the security properties of CPSs, as a system cannot be secured without defining the threats it is subject to. In this work an attacker scenario is presented which addresses the peculiarities of a cyber-physical adversary, and we discuss how this scenario relates to other attacker models popular in the security protocol literature.
| Original language | English |
|---|---|
| Title of host publication | Computer Safety, Reliability, and Security : SAFECOMP 2012 Workshops: Sassur, ASCoMS, DESEC4LCCI, ERCIM/EWICS, IWDE Magdeburg, Germany, September 25-28, 2012 Proceedings |
| Publisher | Springer |
| Publication date | 2012 |
| Pages | 347-356 |
| ISBN (Print) | 978-3-642-33674-4 |
| ISBN (Electronic) | 978-3-642-33675-1 |
| DOIs | |
| Publication status | Published - 2012 |
| Event | 31st International Conference on Computer Safety, Reliability and Security (SAFECOMP) - Herrenkrug Parkhotel, Magdeburg, Germany Duration: 25 Sept 2012 → 28 Sept 2012 http://www-e.uni-magdeburg.de/safecomp/ |
Conference
| Conference | 31st International Conference on Computer Safety, Reliability and Security (SAFECOMP) |
|---|---|
| Location | Herrenkrug Parkhotel |
| Country/Territory | Germany |
| City | Magdeburg |
| Period | 25/09/2012 → 28/09/2012 |
| Internet address |
| Series | Lecture Notes in Computer Science |
|---|---|
| Volume | 7613 |
| ISSN | 0302-9743 |
Keywords
- Attacker model
- Cyber-physical threats
- Cyber-physical systems
- Security protocol verification
Fingerprint
Dive into the research topics of 'The Cyber-Physical Attacker'. Together they form a unique fingerprint.Cite this
- APA
- Author
- BIBTEX
- Harvard
- Standard
- RIS
- Vancouver