Design of Software Rejuvenation for CPS Security Using Invariant Sets

被引:24
|
作者
Romagnoli, Raffaele [1 ]
Krogh, Bruce H. [2 ]
Sinopoli, Bruno [3 ]
机构
[1] Carnegie Mellon Univ CMU, Dept Elect & Comp Engn, Pittsburgh, PA 15235 USA
[2] CMU, Software Engn Inst, Pittsburgh, PA USA
[3] Washington Univ, Dept Elect & Syst Engn, St Louis, MO 63130 USA
基金
美国安德鲁·梅隆基金会;
关键词
D O I
10.23919/acc.2019.8815155
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Software rejuvenation has been proposed as a strategy to protect cyber-physical systems (CSPs) against unanticipated and undetectable cyber attacks. The basic idea is to refresh the system periodically with a secure and trusted copy of the online software so as to eliminate all effects of malicious modifications to the run-time code and data. This paper considers software rejuvenation design from a control theoretic perspective. Invariant sets for the Lyapunov function for the safety controller are used to derive bounds on the time that the CPS can operate in mission control mode before the software must be refreshed. With these results it can be guaranteed that the CPS will remain safe under cyber attacks against the run-time system. The approach is illustrated using simulation of the nonlinear dynamics of a quadrotor system. The concluding section discusses directions for further research.
引用
收藏
页码:3740 / 3745
页数:6
相关论文
共 50 条
  • [31] Convex-lifting-based robust control design using the tunable robust invariant sets
    Oravec, Juraj
    Holaza, Juraj
    Horvathova, Michaela
    Nguyen, Ngoc A.
    Kvasnica, Michal
    Bakosova, Monika
    EUROPEAN JOURNAL OF CONTROL, 2019, 49 : 44 - 52
  • [32] Towards improving software security by using simulation to inform requirements and conceptual design
    Nutaro, James
    Allgood, Glenn
    Kuruganti, Teja
    JOURNAL OF DEFENSE MODELING AND SIMULATION-APPLICATIONS METHODOLOGY TECHNOLOGY-JDMS, 2016, 13 (01): : 35 - 41
  • [33] Software Architectural Design meets Security Engineering
    Bode, Stephan
    Fischer, Anja
    Kuehnhauser, Winfried
    Riebisch, Matthias
    16TH ANNUAL IEEE INTERNATIONAL CONFERENCE AND WORKSHOP ON THE ENGINEERING OF COMPUTER BASED SYSTEMS, PROCEEDINGS, 2009, : 109 - 118
  • [34] Advanced Research on Software Security Design and Applications
    Aljawarneh, Shadi A.
    Cena, Federica
    Maatuk, Abdelsalam
    JOURNAL OF UNIVERSAL COMPUTER SCIENCE, 2016, 22 (04) : 453 - 458
  • [35] Model checking security vulnerabilities in software design
    Li Jinhua
    Li Jing
    2010 6TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS NETWORKING AND MOBILE COMPUTING (WICOM), 2010,
  • [36] Security-by-Design Video Conferencing Software
    不详
    INFORMATION-WISSENSCHAFT UND PRAXIS, 2023, 74 (2-3): : 165 - 165
  • [37] A Software Reliability Model for Cloud-Based Software Rejuvenation Using Dynamic Fault Trees
    Rahme, Jean
    Xu, Haiping
    INTERNATIONAL JOURNAL OF SOFTWARE ENGINEERING AND KNOWLEDGE ENGINEERING, 2015, 25 (9-10) : 1491 - 1513
  • [38] Mitigating Security Threats through the use of Security Tactics to Design Secure Cyber-Physical Systems (CPS)
    Orellana, Cristian
    Villegas, Monica M.
    Astudillo, Hernan
    13TH EUROPEAN CONFERENCE ON SOFTWARE ARCHITECTURE (ECSA 2019), VOL 2, 2019, : 109 - 115
  • [39] Utilizing a Vulnerable Software Package to Teach Software Security Design Analysis
    Luburic, Nikola
    Sladic, Goran
    Milosavljevic, Branko
    2019 42ND INTERNATIONAL CONVENTION ON INFORMATION AND COMMUNICATION TECHNOLOGY, ELECTRONICS AND MICROELECTRONICS (MIPRO), 2019, : 1169 - 1174
  • [40] Software Design and Software Product Verification From Security Point of View
    Ozkohen, Albert
    INNOVATION AND SUSTAINABLE COMPETITIVE ADVANTAGE: FROM REGIONAL DEVELOPMENT TO WORLD ECONOMIES, VOLS 1-5, 2012, : 2896 - 2905