Design of Software Rejuvenation for CPS Security Using Invariant Sets

被引:24
|
作者
Romagnoli, Raffaele [1 ]
Krogh, Bruce H. [2 ]
Sinopoli, Bruno [3 ]
机构
[1] Carnegie Mellon Univ CMU, Dept Elect & Comp Engn, Pittsburgh, PA 15235 USA
[2] CMU, Software Engn Inst, Pittsburgh, PA USA
[3] Washington Univ, Dept Elect & Syst Engn, St Louis, MO 63130 USA
基金
美国安德鲁·梅隆基金会;
关键词
D O I
10.23919/acc.2019.8815155
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Software rejuvenation has been proposed as a strategy to protect cyber-physical systems (CSPs) against unanticipated and undetectable cyber attacks. The basic idea is to refresh the system periodically with a secure and trusted copy of the online software so as to eliminate all effects of malicious modifications to the run-time code and data. This paper considers software rejuvenation design from a control theoretic perspective. Invariant sets for the Lyapunov function for the safety controller are used to derive bounds on the time that the CPS can operate in mission control mode before the software must be refreshed. With these results it can be guaranteed that the CPS will remain safe under cyber attacks against the run-time system. The approach is illustrated using simulation of the nonlinear dynamics of a quadrotor system. The concluding section discusses directions for further research.
引用
收藏
页码:3740 / 3745
页数:6
相关论文
共 50 条
  • [21] A software architectural approach to security by design
    Ray, Arnab
    Cleaveland, Rance
    30TH ANNUAL INTERNATIONAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE, VOL 2, SHORT PAPERS/WORKSHOPS/FAST ABSTRACTS/DOCTORAL SYMPOSIUM, PROCEEDINGS, 2006, : 83 - +
  • [22] Hardware and Software Design for Automotive Security
    Bansod, Gaurav
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2013, 13 (09): : 74 - 79
  • [23] DESIGN FOR SECURITY FUNCTIONS OF CHIPCARD SOFTWARE
    DIPPEL, K
    SECURITY AND CONTROL OF INFORMATION TECHNOLOGY IN SOCIETY, 1994, 43 : 129 - 144
  • [24] CPS Security Testbed Development Using Controller-in-the-Middle
    Choi, Seungoh
    Lee, Woomyo
    Shin, Hyeok-Ki
    Yun, Jeong-Han
    Kim, Sin-Kyu
    PROCEEDINGS OF THE 2018 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (ASIACCS'18), 2018, : 829 - 831
  • [25] Path Planning using Positive Invariant Sets
    Danielson, Claus
    Weiss, Avishai
    Berntorp, Karl
    Di Cairano, Stefano
    2016 IEEE 55TH CONFERENCE ON DECISION AND CONTROL (CDC), 2016, : 5986 - 5991
  • [26] Industrial Software Rejuvenation Using Open-Source Parsers
    Mooij, A. J.
    Joy, M. M.
    Eggen, G.
    Janson, P.
    Radulescu, A.
    THEORY AND PRACTICE OF MODEL TRANSFORMATIONS, ICMT 2016, 2016, 9765 : 157 - 172
  • [27] Availability Analysis of Application Servers Using Software Rejuvenation and Virtualization
    Thandar Thein
    Jong Sou Park
    Journal of Computer Science and Technology, 2009, 24 : 339 - 346
  • [28] What are Security Patterns? A Formal Model for Security and Design of Software
    Behrens, Anika
    13TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2018), 2019,
  • [29] Availability Analysis of Application Servers Using Software Rejuvenation and Virtualization
    Thandar Thein
    Jong Sou Park
    Journal of Computer Science & Technology, 2009, 24 (02) : 339 - 346
  • [30] Availability Analysis of Application Servers Using Software Rejuvenation and Virtualization
    Thein, Thandar
    Park, Jong Sou
    JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2009, 24 (02) : 339 - 346