Supervisor Obfuscation Against Actuator Enablement Attack

In this paper, we propose and address the problem of supervisor obfuscation against actuator enablement attack, in a common setting where the actuator attacker can eavesdrop the control commands issued by the supervisor. We propose a method to obfuscate an (insecure) supervisor to make it resilient...

Full description

Saved in:
Bibliographic Details
Published in2019 18th European Control Conference (ECC) pp. 1760 - 1765
Main Authors Zhu, Yuting, Lin, Liyong, Su, Rong
Format Conference Proceeding
LanguageEnglish
Published EUCA 01.06.2019
Subjects
Online AccessGet full text
DOI10.23919/ECC.2019.8795844

Cover

Abstract In this paper, we propose and address the problem of supervisor obfuscation against actuator enablement attack, in a common setting where the actuator attacker can eavesdrop the control commands issued by the supervisor. We propose a method to obfuscate an (insecure) supervisor to make it resilient against actuator enablement attack in such a way that the behavior of the original closed-loop system is preserved. An additional feature of the obfuscated supervisor, if it exists, is that it has exactly the minimum number of states among the set of all the resilient and behavior-preserving supervisors. Our approach involves a simple combination of two basic ideas: 1) a formulation of the problem of computing behavior-preserving supervisors as the problem of computing separating finite state automata under controllability and observability constraints, which can be tackled by using SAT solvers, and 2) the use of a recently proposed technique for the verification of attackability in our setting, with a normality assumption imposed on both the actuator attackers and supervisors.
AbstractList In this paper, we propose and address the problem of supervisor obfuscation against actuator enablement attack, in a common setting where the actuator attacker can eavesdrop the control commands issued by the supervisor. We propose a method to obfuscate an (insecure) supervisor to make it resilient against actuator enablement attack in such a way that the behavior of the original closed-loop system is preserved. An additional feature of the obfuscated supervisor, if it exists, is that it has exactly the minimum number of states among the set of all the resilient and behavior-preserving supervisors. Our approach involves a simple combination of two basic ideas: 1) a formulation of the problem of computing behavior-preserving supervisors as the problem of computing separating finite state automata under controllability and observability constraints, which can be tackled by using SAT solvers, and 2) the use of a recently proposed technique for the verification of attackability in our setting, with a normality assumption imposed on both the actuator attackers and supervisors.
Author Zhu, Yuting
Su, Rong
Lin, Liyong
Author_xml – sequence: 1
  givenname: Yuting
  surname: Zhu
  fullname: Zhu, Yuting
  email: yuting002@e.ntu.edu.sg
  organization: Nanyang Technological University, School of Electrical and Electronic Engineering, Singapore
– sequence: 2
  givenname: Liyong
  surname: Lin
  fullname: Lin, Liyong
  email: liyong.lin@utoronto.ca
  organization: Nanyang Technological University, School of Electrical and Electronic Engineering, Singapore
– sequence: 3
  givenname: Rong
  surname: Su
  fullname: Su, Rong
  email: rsu@ntu.edu.sg
  organization: Nanyang Technological University, School of Electrical and Electronic Engineering, Singapore
BookMark eNotj81KxDAUhSPoQsd5AHHTF2jNX5N7l6XUHxiYhboebtNEgjPp0KaCb2_BOZsPzgcHzh27TmPyjD0IXkmFAp-6tq0kF1iBxRq0vmJbtKCQW6E153DL8H05--knzuNU7PuwzI5yHFPRfFFMcy4alxfKq-wS9Ud_8mntcib3fc9uAh1nv71wwz6fu4_2tdztX97aZldGYetcKicGRA21o4EDV-AFQm-MlSbQQHxN7R0FiZobEE6FPkhYXbBKKGHUhj3-70bv_eE8xRNNv4fLIfUHuS5D4A
ContentType Conference Proceeding
DBID 6IE
6IL
CBEJK
RIE
RIL
DOI 10.23919/ECC.2019.8795844
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume
IEEE Xplore All Conference Proceedings
IEEE Electronic Library (IEL)
IEEE Proceedings Order Plans (POP All) 1998-Present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
EISBN 9783907144008
3907144007
EndPage 1765
ExternalDocumentID 8795844
Genre orig-research
GroupedDBID 6IE
6IL
CBEJK
RIE
RIL
ID FETCH-LOGICAL-i175t-3c1d99485cad08038e198b66726fada00005ecaf2940681c3fbf286faf7313163
IEDL.DBID RIE
IngestDate Wed Aug 27 07:45:40 EDT 2025
IsPeerReviewed false
IsScholarly false
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-i175t-3c1d99485cad08038e198b66726fada00005ecaf2940681c3fbf286faf7313163
PageCount 6
ParticipantIDs ieee_primary_8795844
PublicationCentury 2000
PublicationDate 2019-June
PublicationDateYYYYMMDD 2019-06-01
PublicationDate_xml – month: 06
  year: 2019
  text: 2019-June
PublicationDecade 2010
PublicationTitle 2019 18th European Control Conference (ECC)
PublicationTitleAbbrev ECC
PublicationYear 2019
Publisher EUCA
Publisher_xml – name: EUCA
Score 1.9448361
Snippet In this paper, we propose and address the problem of supervisor obfuscation against actuator enablement attack, in a common setting where the actuator attacker...
SourceID ieee
SourceType Publisher
StartPage 1760
SubjectTerms actuator attack
Actuators
Automata
Closed loop systems
Controllability
Cyber-physical systems
Degradation
Discrete-event systems
Europe
Observability
Supervisory control
Title Supervisor Obfuscation Against Actuator Enablement Attack
URI https://ieeexplore.ieee.org/document/8795844
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3PS8MwFH5sO3lS2cTf5ODRdmvTtcmxjI0hTAUd7DaaNBEZrGNLL_71vtfMieLBW2lDmuQRvvz4vu8B3MkCgcEkFue3HAaJ5jpQmdKBFdhsnWUyiknvPHtMp_PkYTFctOD-oIUxxjTkMxPSY3OXX1a6pqOyPiXGFknShjZW4rVa_qIy5jKS_fFoRFwtDL4v9yNhSoMXk2OYff3J00RWYe1UqD9-mTD-tykn0PtW5rHnA-acQsusuyBf6g1N-V21ZU_K1jt_DMfyN9z27xzLSSSCe2s2boRSVDPLnSv0qgfzyfh1NA32KRGCd8R5F3AdlZIMXXRR4lqPCxNJodI0i1NblAWhz9DowsYSgVpEmltlY4HfbMYjjmuvM-isq7U5B0ZGLAYjMpAqS0SJASIvL0EsEmkHxl5Al7q93HjXi-W-x5d_v76CIxp6T6K6ho7b1uYG4dqp2yZOn6gRl9E
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1NTwIxEJ0gHvSkBozf7sGjC-xn2yMhEFRAEyHhRrbd1hgSINC9-Oud2SJG48HbprvZtpk0r9O-9wbgTmQIDDo2uL5F4scqUr5kUvmG47AVYyIISe88HKX9Sfw4TaYVuN9pYbTWJflMN-ixvMvPl6qgo7ImFcbmcbwH-wlmFcyptdxVZRiJQDS7nQ6xtTD87ssfJVNKxOgdwfCrL0cUmTcKKxvq45cN438Hcwz1b22e97JDnROo6EUNxGuxokW_Wa69Z2mKjTuI89pvmPhvrNcmmQhm1163lErRn722tZma12HS6447fX9bFMF_R6S3fqSCXJCli8py3O1FXAeCyzRlYWqyPCP8SbTKTCgQqnmgIiNNyPGdYVEQ4e7rFKqL5UKfgUdWLBpj0hKSxTzHEJGbFyceiTAtbc6hRtOerZzvxWw744u_m2_hoD8eDmaDh9HTJRxSGByl6gqqdl3oawRvK2_KmH0C04ObIg
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2019+18th+European+Control+Conference+%28ECC%29&rft.atitle=Supervisor+Obfuscation+Against+Actuator+Enablement+Attack&rft.au=Zhu%2C+Yuting&rft.au=Lin%2C+Liyong&rft.au=Su%2C+Rong&rft.date=2019-06-01&rft.pub=EUCA&rft.spage=1760&rft.epage=1765&rft_id=info:doi/10.23919%2FECC.2019.8795844&rft.externalDocID=8795844