Design of Software Rejuvenation for CPS Security Using Invariant Sets

被引:24
|
作者
Romagnoli, Raffaele [1 ]
Krogh, Bruce H. [2 ]
Sinopoli, Bruno [3 ]
机构
[1] Carnegie Mellon Univ CMU, Dept Elect & Comp Engn, Pittsburgh, PA 15235 USA
[2] CMU, Software Engn Inst, Pittsburgh, PA USA
[3] Washington Univ, Dept Elect & Syst Engn, St Louis, MO 63130 USA
基金
美国安德鲁·梅隆基金会;
关键词
D O I
10.23919/acc.2019.8815155
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Software rejuvenation has been proposed as a strategy to protect cyber-physical systems (CSPs) against unanticipated and undetectable cyber attacks. The basic idea is to refresh the system periodically with a secure and trusted copy of the online software so as to eliminate all effects of malicious modifications to the run-time code and data. This paper considers software rejuvenation design from a control theoretic perspective. Invariant sets for the Lyapunov function for the safety controller are used to derive bounds on the time that the CPS can operate in mission control mode before the software must be refreshed. With these results it can be guaranteed that the CPS will remain safe under cyber attacks against the run-time system. The approach is illustrated using simulation of the nonlinear dynamics of a quadrotor system. The concluding section discusses directions for further research.
引用
收藏
页码:3740 / 3745
页数:6
相关论文
共 50 条
  • [1] Runtime System Support for CPS Software Rejuvenation
    Romagnoli, Raffaele
    Krogh, Bruce H.
    de Niz, Dionisio
    Hristozov, Anton D.
    Sinopoli, Bruno
    IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING, 2023, 11 (03) : 594 - 604
  • [2] Robust Software Rejuvenation for CPS with State Estimation and Disturbances
    Romagnoli, Raffaele
    Krogh, Bruce H.
    Sinopoli, Bruno
    2020 AMERICAN CONTROL CONFERENCE (ACC), 2020, : 1241 - 1246
  • [3] Software rejuvenation approach to security engineering
    Aung, KMM
    Park, JS
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2004, PT 4, 2004, 3046 : 574 - 583
  • [4] Using Security Invariant to Verify Confidentiality in Hardware Design
    Kong, Shuyu
    Shen, Yuanqi
    Zhou, Hai
    PROCEEDINGS OF THE GREAT LAKES SYMPOSIUM ON VLSI 2017 (GLSVLSI' 17), 2017, : 487 - 490
  • [5] A Linear Programming Approach to Computing Safe Sets for Software Rejuvenation
    Arauz, T.
    Maestre, J. M.
    Romagnoli, R.
    Sinopoli, B.
    Camacho, E. F.
    IEEE CONTROL SYSTEMS LETTERS, 2022, 6 : 1214 - 1219
  • [6] Security Based Design Space Exploration for CPS
    Gressl, Lukas
    Rech, Alexander
    Steger, Christian
    Sinnhofer, Andreas
    Weissnegger, Ralph
    PROCEEDINGS OF THE 35TH ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING (SAC'20), 2020, : 593 - 595
  • [7] The Impact of Network Design Interventions on CPS Security
    Oruganti, Pradeep Sharma
    Naghizadeh, Parinaz
    Ahmed, Qadeer
    2021 60TH IEEE CONFERENCE ON DECISION AND CONTROL (CDC), 2021, : 3486 - 3492
  • [8] Using Virtualization to Improve Software Rejuvenation
    Silva, Luis Moura
    Alonso, Javier
    Torres, Jordi
    IEEE TRANSACTIONS ON COMPUTERS, 2009, 58 (11) : 1525 - 1538
  • [9] Using virtualization to improve software rejuvenation
    Silva, Luis Moura
    Alonso, Javier
    Silva, Paulo
    Torres, Jordi
    Andrzejak, Artur
    SIXTH IEEE INTERNATIONAL SYMPOSIUM ON NETWORK COMPUTING AND APPLICATIONS, PROCEEDINGS, 2007, : 33 - +
  • [10] Design of a process for software security
    Byers, David
    Shahmehri, Nahid
    ARES 2007: SECOND INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, PROCEEDINGS, 2007, : 301 - +