Design of Software Rejuvenation for CPS Security Using Invariant Sets

被引:24
|
作者
Romagnoli, Raffaele [1 ]
Krogh, Bruce H. [2 ]
Sinopoli, Bruno [3 ]
机构
[1] Carnegie Mellon Univ CMU, Dept Elect & Comp Engn, Pittsburgh, PA 15235 USA
[2] CMU, Software Engn Inst, Pittsburgh, PA USA
[3] Washington Univ, Dept Elect & Syst Engn, St Louis, MO 63130 USA
基金
美国安德鲁·梅隆基金会;
关键词
D O I
10.23919/acc.2019.8815155
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Software rejuvenation has been proposed as a strategy to protect cyber-physical systems (CSPs) against unanticipated and undetectable cyber attacks. The basic idea is to refresh the system periodically with a secure and trusted copy of the online software so as to eliminate all effects of malicious modifications to the run-time code and data. This paper considers software rejuvenation design from a control theoretic perspective. Invariant sets for the Lyapunov function for the safety controller are used to derive bounds on the time that the CPS can operate in mission control mode before the software must be refreshed. With these results it can be guaranteed that the CPS will remain safe under cyber attacks against the run-time system. The approach is illustrated using simulation of the nonlinear dynamics of a quadrotor system. The concluding section discusses directions for further research.
引用
收藏
页码:3740 / 3745
页数:6
相关论文
共 50 条
  • [41] Robust estimations of the Region of Attraction using invariant sets
    Iannelli, Andrea
    Marcos, Andres
    Lowenberg, Mark
    JOURNAL OF THE FRANKLIN INSTITUTE-ENGINEERING AND APPLIED MATHEMATICS, 2019, 356 (08): : 4622 - 4647
  • [42] Fingerprint matching using multiple sets of invariant moments
    Yang, Jucheng
    ICIC Express Letters, 2011, 5 (01): : 243 - 248
  • [43] Modeling Software Rejuvenation on a Redundant System Using Monte Carlo Simulation
    Malefaki, Sonia
    Koutras, Vasilis P.
    Platis, Agapios N.
    23RD IEEE INTERNATIONAL SYMPOSIUM ON SOFTWARE RELIABILITY ENGINEERING WORKSHOPS (ISSRE 2012), 2012, : 277 - 282
  • [44] Checking Software Security Using EFSMs
    Ermakov, Anton D.
    Prokopenko, Svetlana A.
    Yevtushenko, Nina V.
    2017 18TH INTERNATIONAL CONFERENCE OF YOUNG SPECIALISTS ON MICRO/NANOTECHNOLOGIES AND ELECTRON DEVICES (EDM), 2017, : 87 - 90
  • [45] Security software using neural networks
    Zimmer, JP
    Miteran, J
    Yang, F
    Paindavoine, M
    IECON '98 - PROCEEDINGS OF THE 24TH ANNUAL CONFERENCE OF THE IEEE INDUSTRIAL ELECTRONICS SOCIETY, VOLS 1-4, 1998, : 72 - 74
  • [46] Architecture design of virtual-optics data security using parallel hardware and software
    Peng, X
    Zhang, P
    Niu, HB
    OPTIK, 2004, 115 (01): : 15 - 22
  • [47] Deals with Integrating of security specifications during software design phase using MDA approach
    Abdellatif, Lasbahani
    Chhiba, Mostafa
    Mjihil, Oussama
    PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON INTERNET OF THINGS, DATA AND CLOUD COMPUTING (ICC 2017), 2017,
  • [48] Software safety analysis using rough sets
    Chen-Jimenez, IE
    Kornecki, A
    Zalewski, J
    PROCEEDINGS IEEE SOUTHEASTCON '98: ENGINEERING FOR A NEW ERA, 1998, : 15 - 19
  • [49] Software Component Retrieval Using Rough Sets
    Moiz, Salmon Abdul
    SOFTWARE ENGINEERING (CSI 2015), 2019, 731 : 365 - 374
  • [50] Set-membership observer design based on ellipsoidal invariant sets
    Loukkas, Nassim
    Martinez, John J.
    Meslem, Nacim
    IFAC PAPERSONLINE, 2017, 50 (01): : 6471 - 6476