April 28, 2023, 1:10 a.m. | Monowar Hasan, Sibin Mohan

cs.CR updates on arXiv.org arxiv.org

Cyber-physical systems (CPS) are vulnerable to attacks targeting outgoing
actuation commands that modify their physical behaviors. The limited resources
in such systems, coupled with their stringent timing constraints, often
prevents the checking of every outgoing command. We present a "selective
checking" mechanism that uses game-theoretic modeling to identify the right
subset of commands to be checked in order to deter an adversary. This mechanism
is coupled with a "delay-aware" trusted execution environment (TEE) to ensure
that only verified actuation commands …

adversary attacks aware check command constraints cps cyber environment game identify modeling order physical resources systems targeting trusted execution environment verified vulnerable

CyberSOC Technical Lead

@ Integrity360 | Sandyford, Dublin, Ireland

Cyber Security Strategy Consultant

@ Capco | New York City

Cyber Security Senior Consultant

@ Capco | Chicago, IL

Sr. Product Manager

@ MixMode | Remote, US

Corporate Intern - Information Security (Year Round)

@ Associated Bank | US WI Remote

Senior Offensive Security Engineer

@ CoStar Group | US-DC Washington, DC