skip to main content
10.1145/2897035.2897041acmconferencesArticle/Chapter ViewAbstractPublication PagesicseConference Proceedingsconference-collections
research-article

Model-based security analysis of a water treatment system

Published:14 May 2016Publication History

ABSTRACT

An approach to analyzing the security of a cyber-physical system (CPS) is proposed, where the behavior of a physical plant and its controller are captured in approximate models, and their interaction is rigorously checked to discover potential attacks that involve a varying number of compromised sensors and actuators. As a preliminary study, this approach has been applied to a fully functional water treatment testbed constructed at the Singapore University of Technology and Design. The analysis revealed previously unknown attacks that were confirmed to pose serious threats to the safety of the testbed, and suggests a number of research challenges and opportunities for applying a similar type of formal analysis to cyber-physical security.

References

  1. SWaT: Secure Water Treatment Testbed, 2015. https://itrust.sutd.edu.sg/wp-content/uploads/sites/3/2015/11/Brief-Introduction-to-SWaT_181115.pdf.Google ScholarGoogle Scholar
  2. Alloy language and analyzer. http://alloy.mit.edu.Google ScholarGoogle Scholar
  3. Daniel Jackson. Software Abstractions: logic, language, and analysis. MIT Press, Second edition, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Emina Torlak and Daniel Jackson. Kodkod: A relational model finder. In Tools and Algorithms for the Construction and Analysis of Systems TACAS Portugal, 2007., pages 632--647, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Patrick Cousot and Radhia Cousot. Abstract interpretation: a unified lattice model for static analysis of programs by construction or approximation of fixpoints. In Proceedings of the 4th ACM SIGACT-SIGPLAN symposium on Principles of programming languages, pages 238--252. ACM, 1977. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. David. Urbina, Jairo. Giraldo, Nils Ole. Tippenhauer, and Alvaro Cardenas. Attacking fieldbus communications in ics: Applications to the swat testbed. In Proc. Singapore Cyber-Security Conference (SG-CRC), pages 75--89, 2016.Google ScholarGoogle Scholar
  7. André Platzer. Logical analysis of hybrid systems: proving theorems for complex dynamics. Springer Science & Business Media, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Sicun Gao, Soonho Kong, and Edmund M Clarke. dreal: An SMT solver for nonlinear theories over the reals. In Automated Deduction--CADE-24, pages 208--214. Springer, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Alessandro Cimatti, Sergio Mover, and Stefano Tonetta. SMT-based verification of hybrid systems. In AAAI, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Mathworks. Matlab. http://www.mathworks.com/products/matlab/.Google ScholarGoogle Scholar
  11. Mathworks. Simulink. http://www.mathworks.com/products/simulink/.Google ScholarGoogle Scholar
  12. Ravi Akella and Bruce M McMillin. Model-checking bndc properties in cyber-physical systems. In Computer Software and Applications Conference, 2009. COMPSAC'09. 33rd Annual IEEE International, volume 1, pages 660--663. IEEE, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Chih-Hong Cheng, Natarajan Shankar, Harald Ruess, and Saddek Bensalem. EFSMT: A logical framework for cyber-physical systems. arXiv preprint arXiv:1306.3456, 2013.Google ScholarGoogle Scholar
  14. Edmund M Clarke and Paolo Zuliani. Statistical model checking for cyber-physical systems. In Automated Technology for Verification and Analysis, pages 1--12. Springer, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Dean H Stamatis. Failure mode and effect analysis: FMEA from theory to execution. ASQ Quality Press, 2003.Google ScholarGoogle Scholar
  16. William E Vesely, Francine F Goldberg, Norman H Roberts, and David F Haasl. Fault tree handbook. Technical report, DTIC Document, 1981.Google ScholarGoogle Scholar
  17. X. Zheng, C. Julien, M. Kim, and S. Khurshid. Perceptions on the state of the art in verification and validation in cyber-physical systems. Systems Journal, IEEE, PP(99):1--14, 2015.Google ScholarGoogle Scholar
  18. Sridhar Adepu, Aditya Mathur, Jagadeesh Gunda, and Sasa Djokic. An agent-based framework for simulating and analysing attacks on cyber physical systems. In Algorithms and Architectures for Parallel Processing, pages 785--798. Springer, 2015.Google ScholarGoogle Scholar
  19. S. Adepu and A. Mathur. An investigation into the response of a water treatment system to cyber attacks. In Proceedings of the 17th IEEE High Assurance Systems Engineering Symposium, Orlando, January 2016. Google ScholarGoogle ScholarDigital LibraryDigital Library

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in
  • Published in

    cover image ACM Conferences
    SEsCPS '16: Proceedings of the 2nd International Workshop on Software Engineering for Smart Cyber-Physical Systems
    May 2016
    71 pages
    ISBN:9781450341714
    DOI:10.1145/2897035

    Copyright © 2016 ACM

    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    • Published: 14 May 2016

    Permissions

    Request permissions about this article.

    Request Permissions

    Check for updates

    Qualifiers

    • research-article

    Upcoming Conference

    ICSE 2025

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader