SlideShare une entreprise Scribd logo
1  sur  36
Télécharger pour lire hors ligne
Today's Date
Sub Topic 1 Sub Topic 2 Sub Topic 3 Sub Topic 4 Sub Topic 5
Eliminating Inter-Domain Vulnerabilities
in Cyber-Physical Systems:
An Analysis Contracts Approach
Ivan Ruchkin
Ashwini Rao
Dionisio de Niz
Sagar Chaki
David Garlan
1st
ACM Workshop on CPS Privacy & Security Sponsors: DoD, NSF, NSA October 16, 2015
Sub Topic 1 Sub Topic 2 Sub Topic 3 Sub Topic 4 Sub Topic 5
2
Today's Date Contents
Cyber-Physical Systems Vulnerabilities Analysis Contracts Discussion
Copyright 2015 ACM
This material is based upon work funded and supported by the Department of Defense
under Contract No. FA8721-05-C-0003 with Carnegie Mellon University for the operation
of the Software Engineering Institute, a federally funded research and development center.
NO WARRANTY. THIS CARNEGIE MELLON UNIVERSITY AND SOFTWARE ENGINEERING
INSTITUTE MATERIAL IS FURNISHED ON AN “AS-IS” BASIS. CARNEGIE MELLON UNIVERSITY
MAKES NO WARRANTIES OF ANY KIND, EITHER EXPRESSED OR IMPLIED, AS TO ANY
MATTER INCLUDING, BUT NOT LIMITED TO, WARRANTY OF FITNESS FOR PURPOSE OR
MERCHANTABILITY, EXCLUSIVITY, OR RESULTS OBTAINED FROM USE OF THE MATERIAL.
CARNEGIE MELLON UNIVERSITY DOES NOT MAKE ANY WARRANTY OF ANY KIND WITH
RESPECT TO FREEDOM FROM PATENT, TRADEMARK, OR COPYRIGHT INFRINGEMENT.
This material has been approved for public release and unlimited distribution.
This material may be reproduced in its entirety, without modification, and freely
distributed in written or electronic form without requesting formal permission. Permission
is required for any other use. Requests for permission should be directed to the Software
Engineering Institute at permission@sei.cmu.edu.
Carnegie Mellon® is registered in the U.S. Patent and Trademark Ofce by Carnegie Mellon 
University.
DM-0002865
3
Today's Date Contents
Cyber-Physical Systems Vulnerabilities Analysis Contracts Discussion
● Safety, efficiency, fault-tolerance
– Formal verification, control theory, reliability
engineering, ...
4
Today's Date Contents
Cyber-Physical Systems Vulnerabilities Analysis Contracts Discussion
5
Today's Date Contents
Cyber-Physical Systems Vulnerabilities Analysis Contracts Discussion
Cyber-Physical Systems and Vulnerabilities
● Software-controlled distributed autonomy
● Complex physical behavior
● Diverse interactions: networks, physics, …
– Potentially malicious
● Diverse attack surfaces and vulnerabilities
6
Today's Date Contents
Cyber-Physical Systems Vulnerabilities Analysis Contracts Discussion
Outline
● Security in cyber-physical systems
● Inter-domain vulnerabilities
● Analysis contracts approach
● Discussion
7
Today's Date Contents
Cyber-Physical Systems Vulnerabilities Analysis Contracts Discussion
Scenario
● One car follows another car, which is stopping.
● Senses position, distance, and velocity.
● Safety: must brake and stop without crashing.
– Depends on effective control: slows down smoothly (esp. on ice)
– Depends on reliability: stops even if a sensor malfunctions
– Depends on sensor security: stops even if a sensor is spoofed
x
Distance
Position
Velocity
8
Today's Date Contents
Cyber-Physical Systems Vulnerabilities Analysis Contracts Discussion
Braking Subsystem Architecture
Full model: github.com/bisc/collision_detection_aadl
9
Today's Date Contents
Cyber-Physical Systems Vulnerabilities Analysis Contracts Discussion
Exploiting Sensors
● Adversary models:
– Knows the system's architecture
– Internal or external (not all-powerful)
– Spoofs data for respective sensor type
● Attack steps (online):
1. Find a vulnerable set of sensors in a car
2. Spoof all of the sensors in the set
Impact: the control is misled and possibly crashes
10
Today's Date Contents
Cyber-Physical Systems Vulnerabilities Analysis Contracts Discussion
Analyses (offline)
Control
Analysis
Failure Modes
and Effects
Analysis
Trustworthiness
Analysis
11
Today's Date Contents
Cyber-Physical Systems Vulnerabilities Analysis Contracts Discussion
Analysis 1: FMEA
● Failure Modes and Effects Analysis [Schneider1996]
– Mature and common in reliability engineering
● Goals:
1. Determine most likely “failure modes”
● Configurations where some components failed
2. Augment the system to reduce failure likelihood
P = 0.1 P = 0.05 P = 0.01
12
Today's Date Contents
Cyber-Physical Systems Vulnerabilities Analysis Contracts Discussion
Analysis 2: Sensor Trustworthiness
● Goal: determine trustworthiness of each sensor
– Given an attacker model [Miao2013]
Internal attacker External attacker
13
Today's Date Contents
Cyber-Physical Systems Vulnerabilities Analysis Contracts Discussion
Analysis 3: Secure Control
● Goals: [Fawzi2014]
1. Tune controllers and state estimators
2. Determine if control is safe and smooth
● Minimal sensor trust assumption: at least
50% sensors are providing trustworthy data (for
each sensed variable)
14
Today's Date Contents
Cyber-Physical Systems Vulnerabilities Analysis Contracts Discussion
Exploiting Vulnerability
minimal trust
Internal attacker
15
Today's Date Contents
Cyber-Physical Systems Vulnerabilities Analysis Contracts Discussion
Exploiting Vulnerability
minimal trust
Internal attacker
16
Today's Date Contents
Cyber-Physical Systems Vulnerabilities Analysis Contracts Discussion
Exploiting Vulnerability
minimal trust
Internal attacker
17
Today's Date Contents
Cyber-Physical Systems Vulnerabilities Analysis Contracts Discussion
Exploiting Vulnerability
minimal trust
Internal attacker
18
Today's Date Contents
Cyber-Physical Systems Vulnerabilities Analysis Contracts Discussion
Exploiting Vulnerability
minimal trust
Internal attacker
19
Today's Date Contents
Cyber-Physical Systems Vulnerabilities Analysis Contracts Discussion
Problem: Inter-Domain Vulnerabilities
● Uncontrolled analysis interactions may lead to
introduction of vulnerabilities into CPS.
● Cause: unsatisfied dependencies and
assumptions.
● Introduced offline, exploited online.
20
Today's Date Contents
Cyber-Physical Systems Vulnerabilities Analysis Contracts Discussion
Outline
● Security in cyber-physical systems
● Inter-domain vulnerabilities
● Analysis contracts approach
● Discussion
21
Today's Date Contents
Cyber-Physical Systems Vulnerabilities Analysis Contracts Discussion
Possible Solutions
● Cybersecurity online: IDS, firewalls
– Oblivious of diverse engineering analyses
● Cybersecurity offline: encryption, secure
protocols, secure-by-design
– May not work with physical world
● Control-theoretic CPS security [Fawzi2014]
– Does not consider fault-tolerance and other factors
● Component modeling, interface theories
– Focuses on system parts, not quality concerns
22
Today's Date Contents
Cyber-Physical Systems Vulnerabilities Analysis Contracts Discussion
Analysis Contracts Approach
1. Model the system's architecture
2. Formalize contracts for analyses [Ruchkin2014]
● Inputs, outputs, assumptions, guarantees
3. Execute analyses correctly (offline)
● Dependencies met
● Assumptions satisfied
● Expectation: inter-domain vulnerabilities are
detected and prevented
23
Today's Date Contents
Cyber-Physical Systems Vulnerabilities Analysis Contracts Discussion
Step 1: Architecture Modeling
● AADL – Architecture Analysis and Design
Language [Feiler2005]
● Provides standardized high-level vocabulary
– Components and connectors: sensors, controllers,
actuators, …
– Properties: sensor variables, trustworthiness,
attacker model, ...
– Modes: configurations of components, connectors,
and their properties
24
Today's Date Contents
Cyber-Physical Systems Vulnerabilities Analysis Contracts Discussion
Step 2: Analysis Contract Specification
Analysis Input Output
FMEA Fault-tolerance
requirements
Sensors,
controllers,
modes
Trustworthiness Sensors, attacker
model
Sensor
trustworthiness
Control Sensors,
controllers
Control safety
25
Today's Date Contents
Cyber-Physical Systems Vulnerabilities Analysis Contracts Discussion
Analytic Dependencies
Control
Analysis
Failure Modes
and Effects
Analysis
Trustworthiness
Analysis
Sensors, controllers
Sensors Sensor
trustworthiness
Depends on
26
Today's Date Contents
Cyber-Physical Systems Vulnerabilities Analysis Contracts Discussion
Assumptions and Guarantees
● Logically specify for each analysis
● Ctrl analysis assumption (minimal sensor trust):
● Actual second-order encoding in SMTv2:
27
Today's Date Contents
Cyber-Physical Systems Vulnerabilities Analysis Contracts Discussion
Step 3: Contract Verification
● Deterministic: first-order predicate logic
– Implemented in the ACTIVE tool [Ruchkin2014]
using the Z3 solver
– Doesn't support second-order yet
● Probabilistic
– Not fully designed, or implemented
– Plan to:
● Incorporate Probabilistic Computation Tree Logic (PCTL)
in the language
● Use probabilistic model checking tools: PRISM or MRMC
28
Today's Date Contents
Cyber-Physical Systems Vulnerabilities Analysis Contracts Discussion
Detecting Vulnerability
minimal trust
Internal attacker
29
Today's Date Contents
Cyber-Physical Systems Vulnerabilities Analysis Contracts Discussion
Outline
● Security in cyber-physical systems
● Inter-domain vulnerabilities
● Analysis contracts approach
● Discussion
30
Today's Date Contents
Cyber-Physical Systems Vulnerabilities Analysis Contracts Discussion
Limitations
● Generality
– Approach applicable to other domains?
● Scalability & expressiveness
– Will verification be feasible in other cases?
● Practicality
– Is the up-front formal effort worth it?
31
Today's Date Contents
Cyber-Physical Systems Vulnerabilities Analysis Contracts Discussion
Future Work
● Richer contracts
– Behavioral models for security
– Probabilistic statements
– Something else?
● Incorporating relevant domains
– Suggestions?
● Validation
– NOT building a self-driving car from scratch
– Ideas?
32
Today's Date Contents
Cyber-Physical Systems Vulnerabilities Analysis Contracts Discussion
Summary
● Described inter-domain vulnerabilities
● Demonstrated the analysis contracts approach
– Specified analysis contracts
– Determined dependencies
– Verified deterministic assumptions
● Future work: more models and analyses, richer
contracts, and validation
Email me: iruchkin@cs.cmu.edu
ACTIVE tool: github.com/bisc/active
Car model: github.com/bisc/collision_detection_aadl
33
Today's Date Contents
Cyber-Physical Systems Vulnerabilities Analysis Contracts Discussion
References
● H. Schneider. Failure Mode and Effect Analysis:
FMEA From Theory to Execution. Technometrics,
38(1), 1996.
● C. Miao, L. Huang, W. Guo, and H. Xu. A
Trustworthiness Evaluation Method for Wireless
Sensor Nodes Based on D-S Evidence Theory. In
Wireless Algorithms, Systems, and Applications,
Springer, 2013.
● H. Fawzi, P. Tabuada, and S. Diggavi. Secure
Estimation and Control for Cyber-Physical Systems
Under Adversarial Attacks. IEEE Transactions on
Automatic Control, 59(6), 2014.
34
Today's Date Contents
Cyber-Physical Systems Vulnerabilities Analysis Contracts Discussion
References (continued)
● I. Ruchkin, D. D. Niz, D. Garlan, and S. Chaki. Contract-based
integration of cyber-physical analyses. In Proceedings of the 14th
International Conference on Embedded Software. ACM Press, 2014.
● I. Ruchkin, D. De Niz, S. Chaki, and D. Garlan. ACTIVE: A Tool for
Integrating Analysis Contracts. In The 5th Analytic Virtual Integration of
Cyber-Physical Systems Workshop, Rome, Italy, 2014.
● P. H. Feiler, B. Lewis, S. Vestal, and E. Colbert. An Overview of the SAE
Architecture Analysis & Design Language (AADL) Standard: A Basis for
Model-Based Architecture-Driven Embedded Systems Engineering. In
Architecture Description Languages. Springer Science, 2005.
● R. Nieuwenhuis, A. Oliveras, C. Tinelli. Solving SAT and SAT Modulo
Theories: From an Abstract Davis–Putnam–Logemann–Loveland
Procedure to DPLL(T). In Journal of the ACM, 2006.
● L. de Moura and N. Bjrner. Z3: An Efficient SMT Solver. In Lecture Notes
in Computer Science, pages 337{340. Springer, 2008.
35
Today's Date Contents
Cyber-Physical Systems Vulnerabilities Analysis Contracts Discussion
AADL Example
36
Today's Date Contents
Cyber-Physical Systems Vulnerabilities Analysis Contracts Discussion
Probabilistic Contracts
● Reliability assumption: “probabilities of sensors
not working are independent.”
● Security assumption: “probabilities of sensors
not working are dependent.”

Contenu connexe

Tendances

The Finest Penetration Testing Framework for Software-Defined Networks
The Finest Penetration Testing Framework for Software-Defined NetworksThe Finest Penetration Testing Framework for Software-Defined Networks
The Finest Penetration Testing Framework for Software-Defined Networks
Priyanka Aash
 
DeepLocker - Concealing Targeted Attacks with AI Locksmithing
DeepLocker - Concealing Targeted Attacks with AI LocksmithingDeepLocker - Concealing Targeted Attacks with AI Locksmithing
DeepLocker - Concealing Targeted Attacks with AI Locksmithing
Priyanka Aash
 

Tendances (20)

Car cybersecurity: What do automakers really think?
Car cybersecurity: What do automakers really think?Car cybersecurity: What do automakers really think?
Car cybersecurity: What do automakers really think?
 
(SACON) Wayne Tufek - chapter six - dwell time
(SACON) Wayne Tufek - chapter six - dwell time(SACON) Wayne Tufek - chapter six - dwell time
(SACON) Wayne Tufek - chapter six - dwell time
 
Tech r35
Tech r35Tech r35
Tech r35
 
Slide Deck – Session 4 – FRSecure CISSP Mentor Program 2017
Slide Deck – Session 4 – FRSecure CISSP Mentor Program 2017Slide Deck – Session 4 – FRSecure CISSP Mentor Program 2017
Slide Deck – Session 4 – FRSecure CISSP Mentor Program 2017
 
Slide Deck CISSP Class Session 4
Slide Deck CISSP Class Session 4Slide Deck CISSP Class Session 4
Slide Deck CISSP Class Session 4
 
Certificate Management Protocols for 1609.2 Certificates
Certificate Management Protocols for 1609.2 CertificatesCertificate Management Protocols for 1609.2 Certificates
Certificate Management Protocols for 1609.2 Certificates
 
Evaluation of network security based on next generation intrusion prevention ...
Evaluation of network security based on next generation intrusion prevention ...Evaluation of network security based on next generation intrusion prevention ...
Evaluation of network security based on next generation intrusion prevention ...
 
IEEE 1609.2 and Connected Vehicle Security: Standards Making in a Pocket Univ...
IEEE 1609.2 and Connected Vehicle Security: Standards Making in a Pocket Univ...IEEE 1609.2 and Connected Vehicle Security: Standards Making in a Pocket Univ...
IEEE 1609.2 and Connected Vehicle Security: Standards Making in a Pocket Univ...
 
MITRE ATT&CKcon 2018: ATT&CK: All the Things, Neelsen Cyrus and David Thompso...
MITRE ATT&CKcon 2018: ATT&CK: All the Things, Neelsen Cyrus and David Thompso...MITRE ATT&CKcon 2018: ATT&CK: All the Things, Neelsen Cyrus and David Thompso...
MITRE ATT&CKcon 2018: ATT&CK: All the Things, Neelsen Cyrus and David Thompso...
 
DTS Solution - Yehia Mamdouh - Release your pet worm on your infrastructure....
DTS Solution - Yehia Mamdouh - Release your pet worm on your infrastructure....DTS Solution - Yehia Mamdouh - Release your pet worm on your infrastructure....
DTS Solution - Yehia Mamdouh - Release your pet worm on your infrastructure....
 
The Sweet Spot of Cyber Intelligence
The Sweet Spot of Cyber IntelligenceThe Sweet Spot of Cyber Intelligence
The Sweet Spot of Cyber Intelligence
 
(SACON) Wayne Tufek - chapter five - attacks
(SACON) Wayne Tufek - chapter five - attacks(SACON) Wayne Tufek - chapter five - attacks
(SACON) Wayne Tufek - chapter five - attacks
 
Understanding Cyber Attack - Cyber Kill Chain.pdf
Understanding Cyber Attack - Cyber Kill Chain.pdfUnderstanding Cyber Attack - Cyber Kill Chain.pdf
Understanding Cyber Attack - Cyber Kill Chain.pdf
 
The Finest Penetration Testing Framework for Software-Defined Networks
The Finest Penetration Testing Framework for Software-Defined NetworksThe Finest Penetration Testing Framework for Software-Defined Networks
The Finest Penetration Testing Framework for Software-Defined Networks
 
Shah Sheikh / ISACA UAE - Deep Dive on Evasive Malware
Shah Sheikh / ISACA UAE - Deep Dive on Evasive MalwareShah Sheikh / ISACA UAE - Deep Dive on Evasive Malware
Shah Sheikh / ISACA UAE - Deep Dive on Evasive Malware
 
For Critical Infrastructure Protection
For Critical Infrastructure ProtectionFor Critical Infrastructure Protection
For Critical Infrastructure Protection
 
Lesson 2 - IDPS
Lesson 2 - IDPSLesson 2 - IDPS
Lesson 2 - IDPS
 
Threat-Based Adversary Emulation with MITRE ATT&CK
Threat-Based Adversary Emulation with MITRE ATT&CKThreat-Based Adversary Emulation with MITRE ATT&CK
Threat-Based Adversary Emulation with MITRE ATT&CK
 
DeepLocker - Concealing Targeted Attacks with AI Locksmithing
DeepLocker - Concealing Targeted Attacks with AI LocksmithingDeepLocker - Concealing Targeted Attacks with AI Locksmithing
DeepLocker - Concealing Targeted Attacks with AI Locksmithing
 
Cyber Incident Response Team - NIMS - Public Comment
Cyber Incident Response Team  -  NIMS  -  Public CommentCyber Incident Response Team  -  NIMS  -  Public Comment
Cyber Incident Response Team - NIMS - Public Comment
 

En vedette

En vedette (15)

ACCESSIBILITY OF MOBILE CYBER PHYSICAL SYSTEM 01
ACCESSIBILITY OF MOBILE CYBER PHYSICAL SYSTEM 01ACCESSIBILITY OF MOBILE CYBER PHYSICAL SYSTEM 01
ACCESSIBILITY OF MOBILE CYBER PHYSICAL SYSTEM 01
 
Braking the Connected Car: The Future of Vehicle Vulnerabilities
Braking the Connected Car: The Future of Vehicle VulnerabilitiesBraking the Connected Car: The Future of Vehicle Vulnerabilities
Braking the Connected Car: The Future of Vehicle Vulnerabilities
 
Architectures for Cyber-Physical Systems, or Why Ivan Doesn’t Want to Graduate
Architectures for Cyber-Physical Systems, or Why Ivan Doesn’t Want to GraduateArchitectures for Cyber-Physical Systems, or Why Ivan Doesn’t Want to Graduate
Architectures for Cyber-Physical Systems, or Why Ivan Doesn’t Want to Graduate
 
8.27.2014, Robot World: How Cyber Physical Systems are Changing Human-Machine...
8.27.2014, Robot World: How Cyber Physical Systems are Changing Human-Machine...8.27.2014, Robot World: How Cyber Physical Systems are Changing Human-Machine...
8.27.2014, Robot World: How Cyber Physical Systems are Changing Human-Machine...
 
SERENE 2014 School: Measurement-Driven Resilience Design of Cloud-Based Cyber...
SERENE 2014 School: Measurement-Driven Resilience Design of Cloud-Based Cyber...SERENE 2014 School: Measurement-Driven Resilience Design of Cloud-Based Cyber...
SERENE 2014 School: Measurement-Driven Resilience Design of Cloud-Based Cyber...
 
John Walsh, Sypris on Cyber Physical Systems - Boston SECoT MeetUp 2015
John Walsh, Sypris on Cyber Physical Systems  - Boston SECoT MeetUp 2015John Walsh, Sypris on Cyber Physical Systems  - Boston SECoT MeetUp 2015
John Walsh, Sypris on Cyber Physical Systems - Boston SECoT MeetUp 2015
 
PCI and Vulnerability Assessments - What’s Missing
PCI and Vulnerability Assessments - What’s MissingPCI and Vulnerability Assessments - What’s Missing
PCI and Vulnerability Assessments - What’s Missing
 
SERENE 2014 School: Challenges in Cyber-Physical Systems
SERENE 2014 School: Challenges in Cyber-Physical SystemsSERENE 2014 School: Challenges in Cyber-Physical Systems
SERENE 2014 School: Challenges in Cyber-Physical Systems
 
SERENE 2014 School: Resilience in Cyber-Physical Systems: Challenges and Oppo...
SERENE 2014 School: Resilience in Cyber-Physical Systems: Challenges and Oppo...SERENE 2014 School: Resilience in Cyber-Physical Systems: Challenges and Oppo...
SERENE 2014 School: Resilience in Cyber-Physical Systems: Challenges and Oppo...
 
Cyber physical systems and robotics
Cyber physical systems and roboticsCyber physical systems and robotics
Cyber physical systems and robotics
 
Building the Next Smart City With Mobile Cyber-Physical Systems
Building the Next Smart City With Mobile Cyber-Physical SystemsBuilding the Next Smart City With Mobile Cyber-Physical Systems
Building the Next Smart City With Mobile Cyber-Physical Systems
 
4th Industrial Revolution is Beyond Cyber Physical Systems
4th Industrial Revolution is Beyond Cyber Physical Systems 4th Industrial Revolution is Beyond Cyber Physical Systems
4th Industrial Revolution is Beyond Cyber Physical Systems
 
Cyber-Physical Systems - contradicting requirements as drivers for innovation
Cyber-Physical Systems - contradicting requirements as drivers for innovationCyber-Physical Systems - contradicting requirements as drivers for innovation
Cyber-Physical Systems - contradicting requirements as drivers for innovation
 
Enter into the 4th Industrial Revolution
Enter into the 4th Industrial RevolutionEnter into the 4th Industrial Revolution
Enter into the 4th Industrial Revolution
 
Slideshare ppt
Slideshare pptSlideshare ppt
Slideshare ppt
 

Similaire à Eliminating Inter-Domain Vulnerabilities in Cyber-Physical Systems: An Analysis Contracts Approach

Embedded Systems Security
Embedded Systems Security Embedded Systems Security
Embedded Systems Security
Malachi Jones
 
RAMNSS_2016_service_porfolio
RAMNSS_2016_service_porfolioRAMNSS_2016_service_porfolio
RAMNSS_2016_service_porfolio
Rhys A. Mossom
 
CyberCrime in the Cloud and How to defend Yourself
CyberCrime in the Cloud and How to defend Yourself CyberCrime in the Cloud and How to defend Yourself
CyberCrime in the Cloud and How to defend Yourself
Alert Logic
 
Include at least 250 words in your posting and at least 250 words in
Include at least 250 words in your posting and at least 250 words inInclude at least 250 words in your posting and at least 250 words in
Include at least 250 words in your posting and at least 250 words in
maribethy2y
 
Tonight, March 5th – Class 7 (last class) your test” on ICS.docx
Tonight, March 5th – Class 7 (last class)   your test” on ICS.docxTonight, March 5th – Class 7 (last class)   your test” on ICS.docx
Tonight, March 5th – Class 7 (last class) your test” on ICS.docx
turveycharlyn
 
Peck shield audit-report-strips-1.0-for_medium
Peck shield audit-report-strips-1.0-for_mediumPeck shield audit-report-strips-1.0-for_medium
Peck shield audit-report-strips-1.0-for_medium
ChengZhu22
 

Similaire à Eliminating Inter-Domain Vulnerabilities in Cyber-Physical Systems: An Analysis Contracts Approach (20)

Cyber Security: Threats and Needed Actions
Cyber Security: Threats and Needed ActionsCyber Security: Threats and Needed Actions
Cyber Security: Threats and Needed Actions
 
Embedded Systems Security
Embedded Systems Security Embedded Systems Security
Embedded Systems Security
 
Security Architecture for Cyber Physical Systems
Security Architecture for Cyber Physical SystemsSecurity Architecture for Cyber Physical Systems
Security Architecture for Cyber Physical Systems
 
RAMNSS_2016_service_porfolio
RAMNSS_2016_service_porfolioRAMNSS_2016_service_porfolio
RAMNSS_2016_service_porfolio
 
CyberCrime in the Cloud and How to defend Yourself
CyberCrime in the Cloud and How to defend Yourself CyberCrime in the Cloud and How to defend Yourself
CyberCrime in the Cloud and How to defend Yourself
 
Demystifying Cloud Security Compliance
Demystifying Cloud Security ComplianceDemystifying Cloud Security Compliance
Demystifying Cloud Security Compliance
 
Post Wannacry Update
Post Wannacry UpdatePost Wannacry Update
Post Wannacry Update
 
Cybersecurity: Challenges, Initiatives, and Best Practices
Cybersecurity: Challenges, Initiatives, and Best PracticesCybersecurity: Challenges, Initiatives, and Best Practices
Cybersecurity: Challenges, Initiatives, and Best Practices
 
Generic Security Framework for Multiple Heterogeneous Virtual Infrastructures
Generic Security Framework for Multiple Heterogeneous Virtual InfrastructuresGeneric Security Framework for Multiple Heterogeneous Virtual Infrastructures
Generic Security Framework for Multiple Heterogeneous Virtual Infrastructures
 
Critical Infrastructure Assessment Techniques to Prevent Threats and Vulnerab...
Critical Infrastructure Assessment Techniques to Prevent Threats and Vulnerab...Critical Infrastructure Assessment Techniques to Prevent Threats and Vulnerab...
Critical Infrastructure Assessment Techniques to Prevent Threats and Vulnerab...
 
Solving for Compliance: Mobile app security for banking and financial services
Solving for Compliance: Mobile app security for banking and financial servicesSolving for Compliance: Mobile app security for banking and financial services
Solving for Compliance: Mobile app security for banking and financial services
 
All Hope is Not Lost Network Forensics Exposes Today's Advanced Security Thr...
All Hope is Not LostNetwork Forensics Exposes Today's Advanced Security Thr...All Hope is Not LostNetwork Forensics Exposes Today's Advanced Security Thr...
All Hope is Not Lost Network Forensics Exposes Today's Advanced Security Thr...
 
Luncheon 2016-01-21 - Emerging Threats and Strategies for Defense by Paul Fle...
Luncheon 2016-01-21 - Emerging Threats and Strategies for Defense by Paul Fle...Luncheon 2016-01-21 - Emerging Threats and Strategies for Defense by Paul Fle...
Luncheon 2016-01-21 - Emerging Threats and Strategies for Defense by Paul Fle...
 
Include at least 250 words in your posting and at least 250 words in
Include at least 250 words in your posting and at least 250 words inInclude at least 250 words in your posting and at least 250 words in
Include at least 250 words in your posting and at least 250 words in
 
Zero Trust: Redefining Security in the Digital Age
Zero Trust: Redefining Security in the Digital AgeZero Trust: Redefining Security in the Digital Age
Zero Trust: Redefining Security in the Digital Age
 
Vulnerability threat and attack
Vulnerability threat and attackVulnerability threat and attack
Vulnerability threat and attack
 
Information Technology Security Basics
Information Technology Security BasicsInformation Technology Security Basics
Information Technology Security Basics
 
Understanding Technology Stakeholders
Understanding Technology StakeholdersUnderstanding Technology Stakeholders
Understanding Technology Stakeholders
 
Tonight, March 5th – Class 7 (last class) your test” on ICS.docx
Tonight, March 5th – Class 7 (last class)   your test” on ICS.docxTonight, March 5th – Class 7 (last class)   your test” on ICS.docx
Tonight, March 5th – Class 7 (last class) your test” on ICS.docx
 
Peck shield audit-report-strips-1.0-for_medium
Peck shield audit-report-strips-1.0-for_mediumPeck shield audit-report-strips-1.0-for_medium
Peck shield audit-report-strips-1.0-for_medium
 

Plus de Ivan Ruchkin

Causal Repair of Learning-Enabled Cyber-physical Systems
Causal Repair of Learning-Enabled Cyber-physical SystemsCausal Repair of Learning-Enabled Cyber-physical Systems
Causal Repair of Learning-Enabled Cyber-physical Systems
Ivan Ruchkin
 
Overcoming Heterogeneity in Autonomous Cyber-Physical Systems
Overcoming Heterogeneity in Autonomous Cyber-Physical SystemsOvercoming Heterogeneity in Autonomous Cyber-Physical Systems
Overcoming Heterogeneity in Autonomous Cyber-Physical Systems
Ivan Ruchkin
 
Compositional Probabilistic Analysis of Temporal Properties over Stochastic D...
Compositional Probabilistic Analysis of Temporal Properties over Stochastic D...Compositional Probabilistic Analysis of Temporal Properties over Stochastic D...
Compositional Probabilistic Analysis of Temporal Properties over Stochastic D...
Ivan Ruchkin
 
Thesis Defense: Integration of Modeling Methods for Cyber-Physical Systems
Thesis Defense: Integration of Modeling Methods for Cyber-Physical SystemsThesis Defense: Integration of Modeling Methods for Cyber-Physical Systems
Thesis Defense: Integration of Modeling Methods for Cyber-Physical Systems
Ivan Ruchkin
 

Plus de Ivan Ruchkin (20)

Poster: Conservative Safety Monitors of Stochastic Dynamical Systems
Poster: Conservative Safety Monitors of Stochastic Dynamical SystemsPoster: Conservative Safety Monitors of Stochastic Dynamical Systems
Poster: Conservative Safety Monitors of Stochastic Dynamical Systems
 
Poster: How Safe Am I Given What I See? Calibrated Prediction of Safety Chanc...
Poster: How Safe Am I Given What I See? Calibrated Prediction of Safety Chanc...Poster: How Safe Am I Given What I See? Calibrated Prediction of Safety Chanc...
Poster: How Safe Am I Given What I See? Calibrated Prediction of Safety Chanc...
 
Verify-then-Monitor: Calibration Guarantees for Safety Confidence
Verify-then-Monitor: Calibration Guarantees for Safety ConfidenceVerify-then-Monitor: Calibration Guarantees for Safety Confidence
Verify-then-Monitor: Calibration Guarantees for Safety Confidence
 
Causal Repair of Learning-Enabled Cyber-physical Systems
Causal Repair of Learning-Enabled Cyber-physical SystemsCausal Repair of Learning-Enabled Cyber-physical Systems
Causal Repair of Learning-Enabled Cyber-physical Systems
 
Conservative Safety Monitors of Stochastic Dynamical Systems
Conservative Safety Monitors of Stochastic Dynamical SystemsConservative Safety Monitors of Stochastic Dynamical Systems
Conservative Safety Monitors of Stochastic Dynamical Systems
 
Confidence Composition for Monitors of Verification Assumptions
Confidence Composition for Monitors of Verification AssumptionsConfidence Composition for Monitors of Verification Assumptions
Confidence Composition for Monitors of Verification Assumptions
 
Overcoming Heterogeneity in Autonomous Cyber-Physical Systems
Overcoming Heterogeneity in Autonomous Cyber-Physical SystemsOvercoming Heterogeneity in Autonomous Cyber-Physical Systems
Overcoming Heterogeneity in Autonomous Cyber-Physical Systems
 
High-Confidence Data Programming for Evaluating Suppression of Physiological ...
High-Confidence Data Programming for Evaluating Suppression of Physiological ...High-Confidence Data Programming for Evaluating Suppression of Physiological ...
High-Confidence Data Programming for Evaluating Suppression of Physiological ...
 
Data Generation with PROSPECT: a Probability Specification Tool
Data Generation with PROSPECT: a Probability Specification ToolData Generation with PROSPECT: a Probability Specification Tool
Data Generation with PROSPECT: a Probability Specification Tool
 
Confidence Monitoring and Composition for Dynamic Assurance of Learning-Enabl...
Confidence Monitoring and Composition for Dynamic Assurance of Learning-Enabl...Confidence Monitoring and Composition for Dynamic Assurance of Learning-Enabl...
Confidence Monitoring and Composition for Dynamic Assurance of Learning-Enabl...
 
Confidence Composition (CoCo) for Dynamic Assurance of Learning-Enabled Auton...
Confidence Composition (CoCo) for Dynamic Assurance of Learning-Enabled Auton...Confidence Composition (CoCo) for Dynamic Assurance of Learning-Enabled Auton...
Confidence Composition (CoCo) for Dynamic Assurance of Learning-Enabled Auton...
 
Confidence Monitoring and Composition for Dynamic Assurance of Learning-Enabl...
Confidence Monitoring and Composition for Dynamic Assurance of Learning-Enabl...Confidence Monitoring and Composition for Dynamic Assurance of Learning-Enabl...
Confidence Monitoring and Composition for Dynamic Assurance of Learning-Enabl...
 
On the Role of Assumptions in Engineering Smart Systems
On the Role of Assumptions in Engineering Smart SystemsOn the Role of Assumptions in Engineering Smart Systems
On the Role of Assumptions in Engineering Smart Systems
 
Compositional Probabilistic Analysis of Temporal Properties over Stochastic D...
Compositional Probabilistic Analysis of Temporal Properties over Stochastic D...Compositional Probabilistic Analysis of Temporal Properties over Stochastic D...
Compositional Probabilistic Analysis of Temporal Properties over Stochastic D...
 
Overview of Epidemic Models for COVID-19
Overview of Epidemic Models for COVID-19Overview of Epidemic Models for COVID-19
Overview of Epidemic Models for COVID-19
 
Thesis Defense: Integration of Modeling Methods for Cyber-Physical Systems
Thesis Defense: Integration of Modeling Methods for Cyber-Physical SystemsThesis Defense: Integration of Modeling Methods for Cyber-Physical Systems
Thesis Defense: Integration of Modeling Methods for Cyber-Physical Systems
 
Towards a Formal Framework for Hybrid Planning in Self-Adaptation
Towards a Formal Framework for Hybrid Planning in Self-AdaptationTowards a Formal Framework for Hybrid Planning in Self-Adaptation
Towards a Formal Framework for Hybrid Planning in Self-Adaptation
 
IPL: An Integration Property Language for Multi-Model Cyber-Physical Systems
IPL: An Integration Property Language for Multi-Model Cyber-Physical SystemsIPL: An Integration Property Language for Multi-Model Cyber-Physical Systems
IPL: An Integration Property Language for Multi-Model Cyber-Physical Systems
 
Inconsistencies in Models of Adaptive Service Robots
Inconsistencies in Models of Adaptive Service RobotsInconsistencies in Models of Adaptive Service Robots
Inconsistencies in Models of Adaptive Service Robots
 
Challenges in Physical Modeling for Adaptation of Cyber-Physical Systems
Challenges in Physical Modeling for Adaptation of Cyber-Physical SystemsChallenges in Physical Modeling for Adaptation of Cyber-Physical Systems
Challenges in Physical Modeling for Adaptation of Cyber-Physical Systems
 

Dernier

+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
Health
 
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female serviceCALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
anilsa9823
 

Dernier (20)

Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS LiveVip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
 
Diamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionDiamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with Precision
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
 
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female serviceCALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial Goals
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf
 
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AISyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptx
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.com
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
 
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
 
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTV
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview Questions
 

Eliminating Inter-Domain Vulnerabilities in Cyber-Physical Systems: An Analysis Contracts Approach

  • 1. Today's Date Sub Topic 1 Sub Topic 2 Sub Topic 3 Sub Topic 4 Sub Topic 5 Eliminating Inter-Domain Vulnerabilities in Cyber-Physical Systems: An Analysis Contracts Approach Ivan Ruchkin Ashwini Rao Dionisio de Niz Sagar Chaki David Garlan 1st ACM Workshop on CPS Privacy & Security Sponsors: DoD, NSF, NSA October 16, 2015 Sub Topic 1 Sub Topic 2 Sub Topic 3 Sub Topic 4 Sub Topic 5
  • 2. 2 Today's Date Contents Cyber-Physical Systems Vulnerabilities Analysis Contracts Discussion Copyright 2015 ACM This material is based upon work funded and supported by the Department of Defense under Contract No. FA8721-05-C-0003 with Carnegie Mellon University for the operation of the Software Engineering Institute, a federally funded research and development center. NO WARRANTY. THIS CARNEGIE MELLON UNIVERSITY AND SOFTWARE ENGINEERING INSTITUTE MATERIAL IS FURNISHED ON AN “AS-IS” BASIS. CARNEGIE MELLON UNIVERSITY MAKES NO WARRANTIES OF ANY KIND, EITHER EXPRESSED OR IMPLIED, AS TO ANY MATTER INCLUDING, BUT NOT LIMITED TO, WARRANTY OF FITNESS FOR PURPOSE OR MERCHANTABILITY, EXCLUSIVITY, OR RESULTS OBTAINED FROM USE OF THE MATERIAL. CARNEGIE MELLON UNIVERSITY DOES NOT MAKE ANY WARRANTY OF ANY KIND WITH RESPECT TO FREEDOM FROM PATENT, TRADEMARK, OR COPYRIGHT INFRINGEMENT. This material has been approved for public release and unlimited distribution. This material may be reproduced in its entirety, without modification, and freely distributed in written or electronic form without requesting formal permission. Permission is required for any other use. Requests for permission should be directed to the Software Engineering Institute at permission@sei.cmu.edu. Carnegie Mellon® is registered in the U.S. Patent and Trademark Ofce by Carnegie Mellon  University. DM-0002865
  • 3. 3 Today's Date Contents Cyber-Physical Systems Vulnerabilities Analysis Contracts Discussion ● Safety, efficiency, fault-tolerance – Formal verification, control theory, reliability engineering, ...
  • 4. 4 Today's Date Contents Cyber-Physical Systems Vulnerabilities Analysis Contracts Discussion
  • 5. 5 Today's Date Contents Cyber-Physical Systems Vulnerabilities Analysis Contracts Discussion Cyber-Physical Systems and Vulnerabilities ● Software-controlled distributed autonomy ● Complex physical behavior ● Diverse interactions: networks, physics, … – Potentially malicious ● Diverse attack surfaces and vulnerabilities
  • 6. 6 Today's Date Contents Cyber-Physical Systems Vulnerabilities Analysis Contracts Discussion Outline ● Security in cyber-physical systems ● Inter-domain vulnerabilities ● Analysis contracts approach ● Discussion
  • 7. 7 Today's Date Contents Cyber-Physical Systems Vulnerabilities Analysis Contracts Discussion Scenario ● One car follows another car, which is stopping. ● Senses position, distance, and velocity. ● Safety: must brake and stop without crashing. – Depends on effective control: slows down smoothly (esp. on ice) – Depends on reliability: stops even if a sensor malfunctions – Depends on sensor security: stops even if a sensor is spoofed x Distance Position Velocity
  • 8. 8 Today's Date Contents Cyber-Physical Systems Vulnerabilities Analysis Contracts Discussion Braking Subsystem Architecture Full model: github.com/bisc/collision_detection_aadl
  • 9. 9 Today's Date Contents Cyber-Physical Systems Vulnerabilities Analysis Contracts Discussion Exploiting Sensors ● Adversary models: – Knows the system's architecture – Internal or external (not all-powerful) – Spoofs data for respective sensor type ● Attack steps (online): 1. Find a vulnerable set of sensors in a car 2. Spoof all of the sensors in the set Impact: the control is misled and possibly crashes
  • 10. 10 Today's Date Contents Cyber-Physical Systems Vulnerabilities Analysis Contracts Discussion Analyses (offline) Control Analysis Failure Modes and Effects Analysis Trustworthiness Analysis
  • 11. 11 Today's Date Contents Cyber-Physical Systems Vulnerabilities Analysis Contracts Discussion Analysis 1: FMEA ● Failure Modes and Effects Analysis [Schneider1996] – Mature and common in reliability engineering ● Goals: 1. Determine most likely “failure modes” ● Configurations where some components failed 2. Augment the system to reduce failure likelihood P = 0.1 P = 0.05 P = 0.01
  • 12. 12 Today's Date Contents Cyber-Physical Systems Vulnerabilities Analysis Contracts Discussion Analysis 2: Sensor Trustworthiness ● Goal: determine trustworthiness of each sensor – Given an attacker model [Miao2013] Internal attacker External attacker
  • 13. 13 Today's Date Contents Cyber-Physical Systems Vulnerabilities Analysis Contracts Discussion Analysis 3: Secure Control ● Goals: [Fawzi2014] 1. Tune controllers and state estimators 2. Determine if control is safe and smooth ● Minimal sensor trust assumption: at least 50% sensors are providing trustworthy data (for each sensed variable)
  • 14. 14 Today's Date Contents Cyber-Physical Systems Vulnerabilities Analysis Contracts Discussion Exploiting Vulnerability minimal trust Internal attacker
  • 15. 15 Today's Date Contents Cyber-Physical Systems Vulnerabilities Analysis Contracts Discussion Exploiting Vulnerability minimal trust Internal attacker
  • 16. 16 Today's Date Contents Cyber-Physical Systems Vulnerabilities Analysis Contracts Discussion Exploiting Vulnerability minimal trust Internal attacker
  • 17. 17 Today's Date Contents Cyber-Physical Systems Vulnerabilities Analysis Contracts Discussion Exploiting Vulnerability minimal trust Internal attacker
  • 18. 18 Today's Date Contents Cyber-Physical Systems Vulnerabilities Analysis Contracts Discussion Exploiting Vulnerability minimal trust Internal attacker
  • 19. 19 Today's Date Contents Cyber-Physical Systems Vulnerabilities Analysis Contracts Discussion Problem: Inter-Domain Vulnerabilities ● Uncontrolled analysis interactions may lead to introduction of vulnerabilities into CPS. ● Cause: unsatisfied dependencies and assumptions. ● Introduced offline, exploited online.
  • 20. 20 Today's Date Contents Cyber-Physical Systems Vulnerabilities Analysis Contracts Discussion Outline ● Security in cyber-physical systems ● Inter-domain vulnerabilities ● Analysis contracts approach ● Discussion
  • 21. 21 Today's Date Contents Cyber-Physical Systems Vulnerabilities Analysis Contracts Discussion Possible Solutions ● Cybersecurity online: IDS, firewalls – Oblivious of diverse engineering analyses ● Cybersecurity offline: encryption, secure protocols, secure-by-design – May not work with physical world ● Control-theoretic CPS security [Fawzi2014] – Does not consider fault-tolerance and other factors ● Component modeling, interface theories – Focuses on system parts, not quality concerns
  • 22. 22 Today's Date Contents Cyber-Physical Systems Vulnerabilities Analysis Contracts Discussion Analysis Contracts Approach 1. Model the system's architecture 2. Formalize contracts for analyses [Ruchkin2014] ● Inputs, outputs, assumptions, guarantees 3. Execute analyses correctly (offline) ● Dependencies met ● Assumptions satisfied ● Expectation: inter-domain vulnerabilities are detected and prevented
  • 23. 23 Today's Date Contents Cyber-Physical Systems Vulnerabilities Analysis Contracts Discussion Step 1: Architecture Modeling ● AADL – Architecture Analysis and Design Language [Feiler2005] ● Provides standardized high-level vocabulary – Components and connectors: sensors, controllers, actuators, … – Properties: sensor variables, trustworthiness, attacker model, ... – Modes: configurations of components, connectors, and their properties
  • 24. 24 Today's Date Contents Cyber-Physical Systems Vulnerabilities Analysis Contracts Discussion Step 2: Analysis Contract Specification Analysis Input Output FMEA Fault-tolerance requirements Sensors, controllers, modes Trustworthiness Sensors, attacker model Sensor trustworthiness Control Sensors, controllers Control safety
  • 25. 25 Today's Date Contents Cyber-Physical Systems Vulnerabilities Analysis Contracts Discussion Analytic Dependencies Control Analysis Failure Modes and Effects Analysis Trustworthiness Analysis Sensors, controllers Sensors Sensor trustworthiness Depends on
  • 26. 26 Today's Date Contents Cyber-Physical Systems Vulnerabilities Analysis Contracts Discussion Assumptions and Guarantees ● Logically specify for each analysis ● Ctrl analysis assumption (minimal sensor trust): ● Actual second-order encoding in SMTv2:
  • 27. 27 Today's Date Contents Cyber-Physical Systems Vulnerabilities Analysis Contracts Discussion Step 3: Contract Verification ● Deterministic: first-order predicate logic – Implemented in the ACTIVE tool [Ruchkin2014] using the Z3 solver – Doesn't support second-order yet ● Probabilistic – Not fully designed, or implemented – Plan to: ● Incorporate Probabilistic Computation Tree Logic (PCTL) in the language ● Use probabilistic model checking tools: PRISM or MRMC
  • 28. 28 Today's Date Contents Cyber-Physical Systems Vulnerabilities Analysis Contracts Discussion Detecting Vulnerability minimal trust Internal attacker
  • 29. 29 Today's Date Contents Cyber-Physical Systems Vulnerabilities Analysis Contracts Discussion Outline ● Security in cyber-physical systems ● Inter-domain vulnerabilities ● Analysis contracts approach ● Discussion
  • 30. 30 Today's Date Contents Cyber-Physical Systems Vulnerabilities Analysis Contracts Discussion Limitations ● Generality – Approach applicable to other domains? ● Scalability & expressiveness – Will verification be feasible in other cases? ● Practicality – Is the up-front formal effort worth it?
  • 31. 31 Today's Date Contents Cyber-Physical Systems Vulnerabilities Analysis Contracts Discussion Future Work ● Richer contracts – Behavioral models for security – Probabilistic statements – Something else? ● Incorporating relevant domains – Suggestions? ● Validation – NOT building a self-driving car from scratch – Ideas?
  • 32. 32 Today's Date Contents Cyber-Physical Systems Vulnerabilities Analysis Contracts Discussion Summary ● Described inter-domain vulnerabilities ● Demonstrated the analysis contracts approach – Specified analysis contracts – Determined dependencies – Verified deterministic assumptions ● Future work: more models and analyses, richer contracts, and validation Email me: iruchkin@cs.cmu.edu ACTIVE tool: github.com/bisc/active Car model: github.com/bisc/collision_detection_aadl
  • 33. 33 Today's Date Contents Cyber-Physical Systems Vulnerabilities Analysis Contracts Discussion References ● H. Schneider. Failure Mode and Effect Analysis: FMEA From Theory to Execution. Technometrics, 38(1), 1996. ● C. Miao, L. Huang, W. Guo, and H. Xu. A Trustworthiness Evaluation Method for Wireless Sensor Nodes Based on D-S Evidence Theory. In Wireless Algorithms, Systems, and Applications, Springer, 2013. ● H. Fawzi, P. Tabuada, and S. Diggavi. Secure Estimation and Control for Cyber-Physical Systems Under Adversarial Attacks. IEEE Transactions on Automatic Control, 59(6), 2014.
  • 34. 34 Today's Date Contents Cyber-Physical Systems Vulnerabilities Analysis Contracts Discussion References (continued) ● I. Ruchkin, D. D. Niz, D. Garlan, and S. Chaki. Contract-based integration of cyber-physical analyses. In Proceedings of the 14th International Conference on Embedded Software. ACM Press, 2014. ● I. Ruchkin, D. De Niz, S. Chaki, and D. Garlan. ACTIVE: A Tool for Integrating Analysis Contracts. In The 5th Analytic Virtual Integration of Cyber-Physical Systems Workshop, Rome, Italy, 2014. ● P. H. Feiler, B. Lewis, S. Vestal, and E. Colbert. An Overview of the SAE Architecture Analysis & Design Language (AADL) Standard: A Basis for Model-Based Architecture-Driven Embedded Systems Engineering. In Architecture Description Languages. Springer Science, 2005. ● R. Nieuwenhuis, A. Oliveras, C. Tinelli. Solving SAT and SAT Modulo Theories: From an Abstract Davis–Putnam–Logemann–Loveland Procedure to DPLL(T). In Journal of the ACM, 2006. ● L. de Moura and N. Bjrner. Z3: An Efficient SMT Solver. In Lecture Notes in Computer Science, pages 337{340. Springer, 2008.
  • 35. 35 Today's Date Contents Cyber-Physical Systems Vulnerabilities Analysis Contracts Discussion AADL Example
  • 36. 36 Today's Date Contents Cyber-Physical Systems Vulnerabilities Analysis Contracts Discussion Probabilistic Contracts ● Reliability assumption: “probabilities of sensors not working are independent.” ● Security assumption: “probabilities of sensors not working are dependent.”