Skip to Main content Skip to Navigation
Conference papers

Using Information Flow Methods to Secure Cyber-Physical Systems

Abstract : The problems involved in securing cyber-physical systems are well known to the critical infrastructure protection community. However, the diversity of cyber-physical systems means that the methods used to analyze system security must often be reinvented. The issues of securing the physical assets of a system, the electronics that control the system and the interfaces between the cyber and physical components of the system require a number of security tools. Of particular interest is preventing an attacker from exploiting nondeducibility-secure information flows to hide an attack or the source of an attack. This potentially enables the attacker to interrupt system availability.This chapter presents an algorithm that formalizes the steps taken to design and test the security of a cyber-physical system. The algorithm leverages information flow security techniques to secure physical assets, cyber assets and the boundaries between security domains.
Document type :
Conference papers
Complete list of metadata

Cited literature [27 references]  Display  Hide  Download

https://hal.inria.fr/hal-01431002
Contributor : Hal Ifip <>
Submitted on : Tuesday, January 10, 2017 - 2:55:57 PM
Last modification on : Wednesday, January 11, 2017 - 4:02:41 PM
Long-term archiving on: : Tuesday, April 11, 2017 - 3:15:04 PM

File

978-3-319-26567-4_12_Chapter.p...
Files produced by the author(s)

Licence


Distributed under a Creative Commons Attribution 4.0 International License

Identifiers

Citation

Gerry Howser. Using Information Flow Methods to Secure Cyber-Physical Systems. 9th International Conference on Critical Infrastructure Protection (ICCIP), Mar 2015, Arlington, VA, United States. pp.185-205, ⟨10.1007/978-3-319-26567-4_12⟩. ⟨hal-01431002⟩

Share

Metrics

Record views

178

Files downloads

546