S3A: Secure system simplex architecture for enhanced security and robustness of cyber-physical systems

Sibin Mohan, Stanley Bak, Emiliano Betti, Heechul Yun, Lui Sha, Marco Caccamo

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

The recently discovered 'W32.Stuxnet' worm has drastically changed the perception that systems managing critical infrastructure are invulnerable to software security attacks. Here we present an architecture that enhances the security of safety-critical cyber-physical systems despite the presence of such malware. Our architecture uses the property that control systems have deterministic real-time) execution behavior to detect an intrusion within 0.6 μs while still guaranteeing the safety of the plant. We also show that even if an attacker is successful (or gains access to the operating system's administrative privileges), the overall state of the physical system still remains safe.

Original languageEnglish (US)
Title of host publicationHiCoNS 2013 - Proceedings of the 2nd ACM International Conference on High Confidence Networked Systems, Part of CPSWeek 2013
Pages65-74
Number of pages10
DOIs
StatePublished - 2013
Event2013 2nd ACM International Conference on High Confidence Networked Systems, HiCoNS 2013, as Part of CPSWeek 2013 - Philadelphia, PA, United States
Duration: Apr 9 2013Apr 11 2013

Publication series

NameHiCoNS 2013 - Proceedings of the 2nd ACM International Conference on High Confidence Networked Systems, Part of CPSWeek 2013

Other

Other2013 2nd ACM International Conference on High Confidence Networked Systems, HiCoNS 2013, as Part of CPSWeek 2013
Country/TerritoryUnited States
CityPhiladelphia, PA
Period4/9/134/11/13

Keywords

  • S3A
  • cyber-physical systems
  • intrusion detection
  • real-time systems
  • safety-critical systems
  • secure simplex
  • stuxnet

ASJC Scopus subject areas

  • Computer Networks and Communications

Fingerprint

Dive into the research topics of 'S3A: Secure system simplex architecture for enhanced security and robustness of cyber-physical systems'. Together they form a unique fingerprint.

Cite this