Towards Adversarial Control Loops in Sensor Attacks: A Case Study to Control the Kinematics and Actuation of Embedded Systems

03/15/2022
by   Yazhou Tu, et al.
0

Recent works investigated attacks on sensors by influencing analog sensor components with acoustic, light, and electromagnetic signals. Such attacks can have extensive security, reliability, and safety implications since many types of the targeted sensors are also widely used in critical process control, robotics, automation, and industrial control systems. While existing works advanced our understanding of the physical-level risks that are hidden from a digital-domain perspective, gaps exist in how the attack can be guided to achieve system-level control in real-time, continuous processes. This paper proposes an adversarial control loop-based approach for real-time attacks on control systems relying on sensors. We study how to utilize the system feedback extracted from physical-domain signals to guide the attacks. In the attack process, injection signals are adjusted in real time based on the extracted feedback to exert targeted influence on a victim control system that is continuously affected by the injected perturbations and applying changes to the physical environment. In our case study, we investigate how an external adversarial control system can be constructed over sensor-actuator systems and demonstrate the attacks with program-controlled processes to manipulate the victim system without accessing its internal statuses.

READ FULL TEXT

page 6

page 8

page 9

page 13

research
06/20/2018

Injected and Delivered: Fabricating Implicit Control over Actuation Systems by Spoofing Inertial Sensors

Inertial sensors provide crucial feedback for control systems to determi...
research
09/09/2022

Replay-based Recovery for Autonomous Robotic Vehicles from Sensor Deception Attacks

Sensors are crucial for autonomous operation in robotic vehicles (RV). P...
research
10/07/2022

BayesImposter: Bayesian Estimation Based .bss Imposter Attack on Industrial Control Systems

Over the last six years, several papers used memory deduplication to tri...
research
04/10/2019

Trick or Heat? Attack on Amplification Circuits to Abuse Critical Temperature Control Systems

Temperature sensors are extensively used in real-time monitoring and con...
research
12/21/2017

Acoustic Denial of Service Attacks on HDDs

Among storage components, hard disk drives (HDDs) have become the most c...
research
04/07/2023

SCART: Simulation of Cyber Attacks for Real-Time

Real-Time systems are often implemented as reactive systems that respond...
research
06/15/2021

Grounds for Suspicion: Physics-based Early Warnings for Stealthy Attacks on Industrial Control Systems

Stealthy attacks on Industrial Control Systems can cause significant dam...

Please sign up or login with your details

Forgot password? Click here to reset