Supervisor Obfuscation Against Actuator Enablement Attack
In this paper, we propose and address the problem of supervisor obfuscation against actuator enablement attack, in a common setting where the actuator attacker can eavesdrop the control commands issued by the supervisor. We propose a method to obfuscate an (insecure) supervisor to make it resilient...
Saved in:
Published in | 2019 18th European Control Conference (ECC) pp. 1760 - 1765 |
---|---|
Main Authors | , , |
Format | Conference Proceeding |
Language | English |
Published |
EUCA
01.06.2019
|
Subjects | |
Online Access | Get full text |
DOI | 10.23919/ECC.2019.8795844 |
Cover
Abstract | In this paper, we propose and address the problem of supervisor obfuscation against actuator enablement attack, in a common setting where the actuator attacker can eavesdrop the control commands issued by the supervisor. We propose a method to obfuscate an (insecure) supervisor to make it resilient against actuator enablement attack in such a way that the behavior of the original closed-loop system is preserved. An additional feature of the obfuscated supervisor, if it exists, is that it has exactly the minimum number of states among the set of all the resilient and behavior-preserving supervisors. Our approach involves a simple combination of two basic ideas: 1) a formulation of the problem of computing behavior-preserving supervisors as the problem of computing separating finite state automata under controllability and observability constraints, which can be tackled by using SAT solvers, and 2) the use of a recently proposed technique for the verification of attackability in our setting, with a normality assumption imposed on both the actuator attackers and supervisors. |
---|---|
AbstractList | In this paper, we propose and address the problem of supervisor obfuscation against actuator enablement attack, in a common setting where the actuator attacker can eavesdrop the control commands issued by the supervisor. We propose a method to obfuscate an (insecure) supervisor to make it resilient against actuator enablement attack in such a way that the behavior of the original closed-loop system is preserved. An additional feature of the obfuscated supervisor, if it exists, is that it has exactly the minimum number of states among the set of all the resilient and behavior-preserving supervisors. Our approach involves a simple combination of two basic ideas: 1) a formulation of the problem of computing behavior-preserving supervisors as the problem of computing separating finite state automata under controllability and observability constraints, which can be tackled by using SAT solvers, and 2) the use of a recently proposed technique for the verification of attackability in our setting, with a normality assumption imposed on both the actuator attackers and supervisors. |
Author | Zhu, Yuting Su, Rong Lin, Liyong |
Author_xml | – sequence: 1 givenname: Yuting surname: Zhu fullname: Zhu, Yuting email: yuting002@e.ntu.edu.sg organization: Nanyang Technological University, School of Electrical and Electronic Engineering, Singapore – sequence: 2 givenname: Liyong surname: Lin fullname: Lin, Liyong email: liyong.lin@utoronto.ca organization: Nanyang Technological University, School of Electrical and Electronic Engineering, Singapore – sequence: 3 givenname: Rong surname: Su fullname: Su, Rong email: rsu@ntu.edu.sg organization: Nanyang Technological University, School of Electrical and Electronic Engineering, Singapore |
BookMark | eNotj81KxDAUhSPoQsd5AHHTF2jNX5N7l6XUHxiYhboebtNEgjPp0KaCb2_BOZsPzgcHzh27TmPyjD0IXkmFAp-6tq0kF1iBxRq0vmJbtKCQW6E153DL8H05--knzuNU7PuwzI5yHFPRfFFMcy4alxfKq-wS9Ud_8mntcib3fc9uAh1nv71wwz6fu4_2tdztX97aZldGYetcKicGRA21o4EDV-AFQm-MlSbQQHxN7R0FiZobEE6FPkhYXbBKKGHUhj3-70bv_eE8xRNNv4fLIfUHuS5D4A |
ContentType | Conference Proceeding |
DBID | 6IE 6IL CBEJK RIE RIL |
DOI | 10.23919/ECC.2019.8795844 |
DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume IEEE Xplore All Conference Proceedings IEEE Electronic Library (IEL) IEEE Proceedings Order Plans (POP All) 1998-Present |
DatabaseTitleList | |
Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
EISBN | 9783907144008 3907144007 |
EndPage | 1765 |
ExternalDocumentID | 8795844 |
Genre | orig-research |
GroupedDBID | 6IE 6IL CBEJK RIE RIL |
ID | FETCH-LOGICAL-i175t-3c1d99485cad08038e198b66726fada00005ecaf2940681c3fbf286faf7313163 |
IEDL.DBID | RIE |
IngestDate | Wed Aug 27 07:45:40 EDT 2025 |
IsPeerReviewed | false |
IsScholarly | false |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-i175t-3c1d99485cad08038e198b66726fada00005ecaf2940681c3fbf286faf7313163 |
PageCount | 6 |
ParticipantIDs | ieee_primary_8795844 |
PublicationCentury | 2000 |
PublicationDate | 2019-June |
PublicationDateYYYYMMDD | 2019-06-01 |
PublicationDate_xml | – month: 06 year: 2019 text: 2019-June |
PublicationDecade | 2010 |
PublicationTitle | 2019 18th European Control Conference (ECC) |
PublicationTitleAbbrev | ECC |
PublicationYear | 2019 |
Publisher | EUCA |
Publisher_xml | – name: EUCA |
Score | 1.9448361 |
Snippet | In this paper, we propose and address the problem of supervisor obfuscation against actuator enablement attack, in a common setting where the actuator attacker... |
SourceID | ieee |
SourceType | Publisher |
StartPage | 1760 |
SubjectTerms | actuator attack Actuators Automata Closed loop systems Controllability Cyber-physical systems Degradation Discrete-event systems Europe Observability Supervisory control |
Title | Supervisor Obfuscation Against Actuator Enablement Attack |
URI | https://ieeexplore.ieee.org/document/8795844 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3PS8MwFH5sO3lS2cTf5ODRdmvTtcmxjI0hTAUd7DaaNBEZrGNLL_71vtfMieLBW2lDmuQRvvz4vu8B3MkCgcEkFue3HAaJ5jpQmdKBFdhsnWUyiknvPHtMp_PkYTFctOD-oIUxxjTkMxPSY3OXX1a6pqOyPiXGFknShjZW4rVa_qIy5jKS_fFoRFwtDL4v9yNhSoMXk2OYff3J00RWYe1UqD9-mTD-tykn0PtW5rHnA-acQsusuyBf6g1N-V21ZU_K1jt_DMfyN9z27xzLSSSCe2s2boRSVDPLnSv0qgfzyfh1NA32KRGCd8R5F3AdlZIMXXRR4lqPCxNJodI0i1NblAWhz9DowsYSgVpEmltlY4HfbMYjjmuvM-isq7U5B0ZGLAYjMpAqS0SJASIvL0EsEmkHxl5Al7q93HjXi-W-x5d_v76CIxp6T6K6ho7b1uYG4dqp2yZOn6gRl9E |
linkProvider | IEEE |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1NTwIxEJ0gHvSkBozf7sGjC-xn2yMhEFRAEyHhRrbd1hgSINC9-Oud2SJG48HbprvZtpk0r9O-9wbgTmQIDDo2uL5F4scqUr5kUvmG47AVYyIISe88HKX9Sfw4TaYVuN9pYbTWJflMN-ixvMvPl6qgo7ImFcbmcbwH-wlmFcyptdxVZRiJQDS7nQ6xtTD87ssfJVNKxOgdwfCrL0cUmTcKKxvq45cN438Hcwz1b22e97JDnROo6EUNxGuxokW_Wa69Z2mKjTuI89pvmPhvrNcmmQhm1163lErRn722tZma12HS6447fX9bFMF_R6S3fqSCXJCli8py3O1FXAeCyzRlYWqyPCP8SbTKTCgQqnmgIiNNyPGdYVEQ4e7rFKqL5UKfgUdWLBpj0hKSxTzHEJGbFyceiTAtbc6hRtOerZzvxWw744u_m2_hoD8eDmaDh9HTJRxSGByl6gqqdl3oawRvK2_KmH0C04ObIg |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2019+18th+European+Control+Conference+%28ECC%29&rft.atitle=Supervisor+Obfuscation+Against+Actuator+Enablement+Attack&rft.au=Zhu%2C+Yuting&rft.au=Lin%2C+Liyong&rft.au=Su%2C+Rong&rft.date=2019-06-01&rft.pub=EUCA&rft.spage=1760&rft.epage=1765&rft_id=info:doi/10.23919%2FECC.2019.8795844&rft.externalDocID=8795844 |