You Can't Always Check What You Wanted: Selective Checking and Trusted Execution to Prevent False Actuations in Cyber-Physical Systems

04/27/2023
by   Monowar Hasan, et al.
0

Cyber-physical systems (CPS) are vulnerable to attacks targeting outgoing actuation commands that modify their physical behaviors. The limited resources in such systems, coupled with their stringent timing constraints, often prevents the checking of every outgoing command. We present a "selective checking" mechanism that uses game-theoretic modeling to identify the right subset of commands to be checked in order to deter an adversary. This mechanism is coupled with a "delay-aware" trusted execution environment (TEE) to ensure that only verified actuation commands are ever sent to the physical system, thus maintaining their safety and integrity. The selective checking and trusted execution (SCATE) framework is implemented on an off-the-shelf ARM platform running standard embedded Linux. We demonstrate the effectiveness of SCATE using four realistic cyber-physical systems (a ground rover, a flight controller, a robotic arm and an automated syringe pump) and study design trade-offs. Not only does SCATE provide a high level of security and high performance, it also suffers from significantly lower overheads (30.48 less) in the process. In fact, SCATE can work with more systems without negatively affecting the safety of the system. Considering that most CPS do not have any such checking mechanisms, and SCATE is guaranteed to meet all the timing requirements (i.e., ensure the safety/integrity of the system), our methods can significantly improve the security (and, hence, safety) of the system.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
01/19/2022

Towards Situational Aware Cyber-Physical Systems: A Security-Enhancing Use Case of Blockchain-based Digital Twins

The complexity of cyberattacks in Cyber-Physical Systems (CPSs) calls fo...
research
04/30/2018

Checking is Believing: Event-Aware Program Anomaly Detection in Cyber-Physical Systems

Securing cyber-physical systems (CPS) against malicious attacks is of pa...
research
11/08/2018

Integrating Security in Resource-Constrained Cyber-Physical Systems

Defense mechanisms against network-level attacks are commonly based on t...
research
08/26/2019

Protecting Actuators in Safety-Critical IoT Systems from Control Spoofing Attacks

In this paper, we propose a framework called Contego-TEE to secure Inter...
research
02/07/2020

Assuring Automotive Data and Software Integrity Employing Distributed Hash Tables and Blockchain

Automotive software is increasingly complex and critical to safe vehicle...
research
05/29/2019

TickTalk -- Timing API for Dynamically Federated Cyber-Physical Systems

Although timing and synchronization of a dynamically-changing set of ele...
research
04/27/2018

Consistency Checking of Functional Requirements

Requirements are informal and semi-formal descriptions of the expected b...

Please sign up or login with your details

Forgot password? Click here to reset